Routing Security key Management in Context of IoT
The Internet of Things (IoT) covers a large range of industries and the users of this cases, ranging from a single constrained device to massive multiplatform deployments of embedded technologies and real-time cloud systems. All these are related to many legacy and emerging communication protocols that allow devices and servers to communicate with each other and in a more interconnected way. At the same time, dozens of alliances and coalitions are forming in the hope of unifying the now fractured and organic IoT landscape. The issues we face in the Internet of Things (IoT) are the exponential volume of devices and the impossibility of accessing them as a user. Designed to help organizations manage the identities of users and "objects" as well as security and easily accessible services, these solutions enable dynamic identity management that is modular, scalable, unlimited and that is done according to a context Security in IoT environments which is a big challenge, given the high number of information exchanges, the diversity and openness of the used communication technologies. In this work, we present some issues on routing security in the context of the internet of things especially the use of Key management in configuring a cryptographic security system. Keywords - IoT; Security; Asymmetrical Systems; Symmetrical Systems; Key Management; LEAP.
I. INTRODUCTION The Internet of Things represents a considerable growth lever for the IT and industrial sectors. Concretely, it involves billions of "smart" and connected objects, which communicate continuously or at regular intervals, transmit to distant information systems a state, a statement, a status, a consumption, an alert, a need, and a geolocation, etc. In general, all our everyday devices are likely to integrate the Internet of Things  :
Automotive: geolocation, contact emergency in case of accident, exchanges with traffic devices (radar, cameras ...), etc.
Home automation: real-time monitoring of heating devices, lighting, water consumption, security, etc.