Open Access Open Access  Restricted Access Subscription Access

Security Improvisation Technique for Internet of Things (IoT) Devices by Using Group Secure Key Generation Based on IIC Metrics

M. Hima Bindu, P. Trinatha Rao


Across various fields of use, the Internet of Things (IoT), that supports farmers across agriculture, smart home and healthcare, has become important. When it comes to processing large volumes of data, it is challenging to design an effective framework with a range of systems and to enforce satisfactory protocols with privacy and protection. Due to the huge amount of information to be produced and managed, along with resources of standard IoT devices, network protection is especially critical. In this study, we address the context and numerous difficulties of IoT protection. We would then illustrate a secure group communication program that incorporates IoT utilizing a low-energy wireless IP network. A new security architecture, which supports stable group key generation and transfer protocol focused on Improved Integrated Circuit (IIC Metrics), has been introduced in the study. The main attributes of the protocol are a single shared key generating mechanism introduced by customer authentication. A rekeying procedure is also essential in preserving the quality of the key and provides complete secrecy. The model reveals the better effects of changes to the new program compared with the conventional public-key solution.


IoT, data security, group communication, key generation, group key

Full Text:



Da Xu L, He W, Li S. Internet of things in industries: A survey. IEEE Trans Industr Inform. 2014 Nov; 10(4): 2233–2243.

Shariatmadari H, Ratasuk R, Iraji S, Laya A, Taleb T, Jantti R, Ghosh A. Machine-type communications: Current status and future perspectives toward 5G systems. IEEE Commun Mag. 2015 Sep; 53(9): 10–17.

Vassilakis VG, Moscholios ID, Vardakas JS, Logothetis MD. On the digital certificate management in advanced metering infrastructure networks. Proc IEICE Information and Communication Technology Forum (ICTF), Poznan, Poland. 2017 Jul.

Chaouchi H. The Internet of Things: Connecting Objects. John Wiley & Sons; 2013.

Gratton DA. The Handbook of Personal Area Networking Technologies and Protocols. Cambridge: Cambridge University Press; 2013.

Parwekar P. From Internet of things towards cloud of things. Proc 2nd International Conference on Computer and Communication Technology (ICCCT), Allahabad, India. 2011 Sep; 329–333.

Ten C-W, Manimaran G, Liu C-C. Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Trans Syst Man Cybern A: Syst Hum. 2010 Jun; 40(4): 853–865.

Shamir. How to share a secret. Commun ACM. 1979 Nov; 22(11): 612–613.

Chen B, Huang YL, Gunes M. S-CBAC: A secure access control model for supporting group access for internet of things. 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Gaithersburg, MD, USA. 2015; 67–67.

Periera P, Eliasson J, Delsing J. An authentication and access control framework for CoAP based internet of things. Proceedings, IECON2014, 40th Annual Conference of the IEEE Industrial Electronics Society. 2014; 5293–5299.

Mahalle P, Prasad N, Prasad R. Threshold cryptography-based group authentication (TCGA) scheme for the Internet of things. 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), Aalborg, Denmark. 2014; 1–5.

Panwar M, Kumar A. Security for IoT an effective DTLS with public certificates. IEEE International conference on advances in Computer Engineering and application (ICACEA). 2015; 163–166.

Papoutsis E. Investigation of the Potential of Generating Encryption Keys for ICM metrics. Ph.D. Dissertation. Dept. Electronics. Kent Univ; 2009.



  • There are currently no refbacks.

Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517