International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-8,Issue-11  ( Nov, 2020 )
Past issues
  1. Volume-8,Issue-10  ( Oct, 2020 )
  2. Volume-8,Issue-9  ( Sep, 2020 )
  3. Volume-8,Issue-8  ( Aug, 2020 )
  4. Volume-8,Issue-7  ( Jul, 2020 )
  5. Volume-8,Issue-6  ( Jun, 2020 )
  6. Volume-8,Issue-5  ( May, 2020 )
  7. Volume-8,Issue-4  ( Apr, 2020 )
  8. Volume-8,Issue-3  ( Mar, 2020 )
  9. Volume-8,Issue-2  ( Feb, 2020 )
  10. Volume-8,Issue-1  ( Jan, 2020 )

Statistics report
Feb. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 94
Paper Published : 1276
No. of Authors : 3207
  Journal Paper

Paper Title
Routing Security key Management in Context of IoT

Abstract
The Internet of Things (IoT) covers a large range of industries and the users of this cases, ranging from a single constrained device to massive multiplatform deployments of embedded technologies and real-time cloud systems. All these are related to many legacy and emerging communication protocols that allow devices and servers to communicate with each other and in a more interconnected way. At the same time, dozens of alliances and coalitions are forming in the hope of unifying the now fractured and organic IoT landscape. The issues we face in the Internet of Things (IoT) are the exponential volume of devices and the impossibility of accessing them as a user. Designed to help organizations manage the identities of users and "objects" as well as security and easily accessible services, these solutions enable dynamic identity management that is modular, scalable, unlimited and that is done according to a context Security in IoT environments which is a big challenge, given the high number of information exchanges, the diversity and openness of the used communication technologies. In this work, we present some issues on routing security in the context of the internet of things especially the use of Key management in configuring a cryptographic security system. Keywords - IoT; Security; Asymmetrical Systems; Symmetrical Systems; Key Management; LEAP. I. INTRODUCTION The Internet of Things represents a considerable growth lever for the IT and industrial sectors. Concretely, it involves billions of "smart" and connected objects, which communicate continuously or at regular intervals, transmit to distant information systems a state, a statement, a status, a consumption, an alert, a need, and a geolocation, etc. In general, all our everyday devices are likely to integrate the Internet of Things [1] [2]:  Automotive: geolocation, contact emergency in case of accident, exchanges with traffic devices (radar, cameras ...), etc.  Home automation: real-time monitoring of heating devices, lighting, water consumption, security, etc. The Internet


Author - Belghachi Mohammed, Feham Mohamed, Debab Naouel

| PDF |
Viewed - 41
| Published on 2020-02-03
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY