Securing the internet of things devices using pre-distributed keys

El Hajjar, A. 2016. Securing the internet of things devices using pre-distributed keys. 2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/ic2ew.2016.22

TitleSecuring the internet of things devices using pre-distributed keys
AuthorsEl Hajjar, A.
TypeConference paper
Abstract

The paper outlines the state of the art, problems and challenges in the Internet of things (IoT) security. It investigates how the key pre-distribution algorithm of Eschenauer and Giglor designed for Distributed Sensor Networks(DSN) performs when applied on the IoT for 6LoWPAN networks. A simulation that uses the Contiki Operating System was developed in order to explore the performance of the algorithm on those devices. After an explanation of the research methodology and the details of the experiment conducted, we present the results from the experiment in comparison with the results obtained by Eschenauer & Giglor.

Year2016
Conference2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW)
PublisherIEEE
Publication dates
Published01 Jan 2016
JournalProceedings - 2016 IEEE International Conference on Cloud Engineering Workshops, IC2EW 2016
ISBN9781509036844
Digital Object Identifier (DOI)https://doi.org/10.1109/ic2ew.2016.22

Related outputs

Wireless Networks Cyber Security Threats and Countermeasures
El Hajjar, A. and Jahankhani, H. El Hajjar, A. and Jahankhani, H. (ed.) 2023. Wireless Networks Cyber Security Threats and Countermeasures. Switzerland Springer.

Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
El Hajjar, A. 2023. Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations. in: Wireless Networks: Cyber Security Threats and Countermeasures Switzerland Springer. pp. 1-42

A proactive approach to protect cloud computing environment against DDoS attack
Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278

Secure routing in IoT networks with SISLOF
El Hajjar, A.E., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. 2017 Global Internet of Things Summit (GIoTS). CICG, Geneva 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/giots.2017.8016278

Secure routing in IoT networks with SISLOF
El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278

Securing the Internet of Things Devices Using Pre-Distributed Keys
El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22

On the Performance of Key Pre-distribution for RPL-based IoT Networks
El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9

Permalink - https://westminsterresearch.westminster.ac.uk/item/vq501/securing-the-internet-of-things-devices-using-pre-distributed-keys


Share this

Usage statistics

60 total views
0 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.