Routing Security Key Management in Context of IoT
The Internet of Things (IoT) covers a large range of industries and the users of this cases, ranging from a single constrained device to massive multiplatform deployments of embedded technologies and real-time cloud systems. All these are related to many legacy and emerging communication protocols that allow devices and servers to communicate with each other and in a more interconnected way. At the same time, dozens of alliances and coalitions are forming in the hope of unifying the now fractured and organic IoT landscape. The issues we face in the Internet of Things (IoT) are the exponential volume of devices and the impossibility of accessing them as a user. Designed to help organizations manage the identities of users and "objects" as well as security and easily accessible services, these solutions enable dynamic identity management that is modular, scalable, unlimited and that is done according to a context Security in IoT environments which is a big challenge, given the high number of information exchanges, the diversity and openness of the used communication technologies. In this work, we present some issues on routing security in the context of the internet of things especially the use of Key management in configuring a cryptographic security system.
Keywords - IoT; Security; Asymmetrical Systems; Symmetrical Systems; Key Management; LEAP.