Long-term secure management of large scale Internet of Things applications

Jun Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


The Internet of Things (IoT)is an emerging paradigm, where the ubiquitous devices can form the networks and connect to Internet. Security and management of devices remain open challenges for the IoT. We adopt the management framework of industry consortium THREAD, where a group of devices cooperating to accomplish the same task (called policy)are administrated by a designated device called commissioner and together they form a policy group. All these policy groups are further managed by a centralized server. In this hierarchical network structure, the secure distribution of the policy information, access control, and group key from the centralized server to commissioner and its peers become challenging given the pervasive, complex and heterogeneous properties of devices. To solve this, we propose protocols/mechanisms along with a variant of Broadcast Encryption called Secure Identity-Based Broadcast Encryption (SIBBE)and demonstrate the feasibility for secure distribution of information to the IoT devices from centralized server. Most of the related work is based on the Attribute-based Encryption (ABE)for IoT devices, which has scalability issues with the number of attributes. Our experimental and simulation evaluations show that our scheme outperforms the existing schemes in terms of scalability, latency, and communication overhead.

Original languageEnglish (US)
Pages (from-to)15-26
Number of pages12
JournalJournal of Network and Computer Applications
StatePublished - Jul 15 2019


  • Attribute based encryption
  • Broadcast encryption
  • Commissioning
  • Grouping
  • Identity based encryption
  • IoT
  • Key distribution
  • Management
  • Security

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications


Dive into the research topics of 'Long-term secure management of large scale Internet of Things applications'. Together they form a unique fingerprint.

Cite this