sumer Electronics, Military & Aerospace) And Seg-
ment Forecasts To 2020. Technical report.
Guoyu Xu, Xingyuan Chen, and Xuehui Du (2012). Chi-
nese Remainder Theorem based DTN group key man-
agement. In 2012 IEEE 14th International Confer-
ence on Communication Technology, pages 779–783,
Chengdu, China. IEEE.
Haque, M. E., Zobaed, S., Islam, M. U., and Areef, F. M.
(2018). Performance Analysis of Cryptographic Al-
gorithms for Selecting Better Utilization on Resource
Constraint Devices. In 2018 21st International Con-
ference of Computer and Information Technology (IC-
CIT), pages 1–6, Dhaka, Bangladesh. IEEE.
Harn, L., Hsu, C.-F., and Li, B. (2018). Centralized
Group Key Establishment Protocol without a Mutu-
ally Trusted Third Party. Mobile Networks and Appli-
cations, 23(5):1132–1140.
Huang, X. and Chen, R. (2018). A Survey of Key Man-
agement Service in Cloud. In 2018 IEEE 9th In-
ternational Conference on Software Engineering and
Service Science (ICSESS), pages 916–919, Beijing,
China. IEEE.
Humayed, A., Lin, J., Li, F., and Luo, B. (2017). Cyber-
Physical Systems Security—A Survey. IEEE Internet
of Things Journal, 4(6):1802–1831.
ISO (2018). Information technology - Security techniques
- Key management - Part 2: Mechanisms using sym-
metric techniques. Standard ISO/IEC 11770-2:2018,
Geneva, CH.
Jank, G. (2020). Secure key management in embedded sys-
tems. Master’s thesis, FH Campus Wien - University
of Applied Sciences.
Jansma, N. and Arrendondo, B. (2004). Performance Com-
parison of Elliptic Curve and RSA Digital Signatures.
Kandi, M. A., Lakhlef, H., Bouabdallah, A., and Challal, Y.
(2020). A versatile Key Management protocol for se-
cure Group and Device-to-Device Communication in
the Internet of Things. Journal of Network and Com-
puter Applications, 150.
Kim, S., Lee, H., and Kwon, T. (2017). POSTER: Re-
thinking Fingerprint Identification on Smartphones. In
Proceedings of the 2017 ACM SIGSAC Conference
on Computer and Communications Security, pages
2515–2517, Dallas Texas USA. ACM.
Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J.
(2017). DDoS in the IoT: Mirai and Other Botnets.
Computer, 50(7).
Lavanya, S. and Usha, D. (2017). A Survey on Key Man-
agement in Internet of Things. SSRN Electronic Jour-
nal.
Leshem, G., David, E., and Domb, M. (2018). Probability
Based Keys Sharing for IOT Security. In 2018 IEEE
International Conference on the Science of Electrical
Engineering in Israel (ICSEE), pages 1–5, Eilat, Is-
rael. IEEE.
Liu, A. and Ning, P. (2008). TinyECC: A Configurable
Library for Elliptic Curve Cryptography in Wireless
Sensor Networks. In 2008 International Conference
on Information Processing in Sensor Networks (ipsn
2008), pages 245–256, St. Louis, MO, USA. IEEE.
Liu, J., Tong, X., Wang, Z., Zhang, M., and Ma, J. (2020).
A Centralized Key Management Scheme Based on
McEliece PKC for Space Network. IEEE Access,
8:42708–42719.
Malik, M., Dutta, M., and Granjal, J. (2019). A Survey
of Key Bootstrapping Protocols Based on Public Key
Cryptography in the Internet of Things. IEEE Access,
7:27443–27464.
Manikandan, G. and Sakthi, U. (2018). A Comprehen-
sive Survey on Various key Management Schemes in
WSN. In 2018 2nd International Conference on I-
SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-
SMAC)I-SMAC (IoT in Social, Mobile, Analytics and
Cloud) (I-SMAC), 2018 2nd International Conference
on, pages 378–383, Palladam, India. IEEE.
Mapoka, T. T. (2013). Group Key Management Proto-
cols for Secure Mobile Multicast Communication:
A Comprehensive Survey. International Journal of
Computer Applications, 84(12):28–38.
Masdari, M., Ahmadzadeh, S., and Bidaki, M. (2017). Key
management in wireless Body Area Network: Chal-
lenges and issues. Journal of Network and Computer
Applications, 91:36–51.
Menesidou, S. A., Katos, V., and Kambourakis, G. (2017).
Cryptographic Key Management in Delay Tolerant
Networks: A Survey. Future Internet, 9(3):26.
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A.
(1997). Handbook of applied cryptography. CRC
Press series on discrete mathematics and its applica-
tions. CRC Press, Boca Raton.
Mesmoudi, S., Benadda, B., and Mesmoudi, A. (2019).
SKWN: Smart and dynamic key management scheme
for wireless sensor networks. International Journal of
Communication Systems, 32(7).
Messai, M.-L. and Seba, H. (2016). A survey of key man-
agement schemes in multi-phase wireless sensor net-
works. Computer Networks, 105:60–74.
Mirjalili, S. H. and Lenstra, A. K. (2008). Security Obser-
vance throughout the Life-Cycle of Embedded Sys-
tems. In ESA.
M.K, J., Abhiraj, K. S., Bolloju, S., Brukbacher, S., Carullo,
G., Dhungel, R., Donahoe, T., Duddilla, R., Duren,
D. V., Falletta, L., Yeoh, J., Santos, J., Ferrari, L.,
Figuigui, A., Futagi, M., Grimes, M., Guzman, A.,
Hendrickson, H., Khemissa, S., Lanois, P., Kanni-
moola, J. M., Naik, S., Perera, C., Rajapaksha, S., Ru-
pasinghe, L., Sharma, A., Szewczul, M., Tatipamula,
S., Thikkavarapu, S., and White, K. (2016). Future-
proofing the Connected World: 13 Steps to Develop-
ing Secure IoT Products.
Murugesan, A. and Saminathan, B. (2018). Key manage-
ment for secured group communication. International
Journal of Pure and Applied Mathematics, 118:33–37.
Nafi, M., Bouzefrane, S., and Omar, M. (2020). Matrix-
based key management scheme for IoT networks. Ad
Hoc Networks, 97.
Nie, S., Liu, L., and Du, Y. (2017). FREE-FALL: HACK-
ING TESLA FROM WIRELESS TO CAN BUS.
Keen Security Lab of Tencent.
Obermaier, J., Hauschild, F., Hiller, M., and Sigl, G. (2018).
An embedded key management system for PUF-based
IoTBDS 2021 - 6th International Conference on Internet of Things, Big Data and Security
90