Rasoul Rasta , Hamid Haj Seyyed Javadi , Midida Reshadi
{"title":"Secure key agreement in IoT: A systematic literature review and taxonomy analysis","authors":"Rasoul Rasta , Hamid Haj Seyyed Javadi , Midida Reshadi","doi":"10.1016/j.compeleceng.2025.110480","DOIUrl":null,"url":null,"abstract":"<div><div>The increasing reliance on smart systems and their remote management has led to the widespread adoption of the Internet of Things (IoT). Despite its benefits, IoT introduces significant communication security challenges due to its heterogeneous components. Key agreement techniques, which establish symmetric encryption keys between communicating parties, are crucial for secure communications. However, the diversity and resource constraints of IoT devices present ongoing challenges. Existing studies on key agreement often focus on devices with specific conditions and specialized communication models. Their broader applicability is limited by that reason. This study addresses this gap by identifying and compiling the necessary features and conditions for key agreement algorithms in IoT environments. We survey key agreement methods to understand the different approaches in IoT using the Systematic Literature Review (SLR) method. This paper aims to categorize, analytically and statistically, the current research techniques on key agreement approaches in IoT published from 2016 to 2024. We present three technical taxonomies for the key agreement approaches in IoT based on the content of current studies. Our findings reveal that crucial parameters such as communication models, essential resources, and required tools are often overlooked in current IoT key management approaches. Notably, only 2% of the reviewed algorithms are lightweight and suitable for device-to-device communication models without prerequisites. This highlights a significant gap, as over 98% of existing algorithms either fail to meet the current requirements of IoT devices or are not easily implementable in the desired environment.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"127 ","pages":"Article 110480"},"PeriodicalIF":4.0000,"publicationDate":"2025-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625004239","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The increasing reliance on smart systems and their remote management has led to the widespread adoption of the Internet of Things (IoT). Despite its benefits, IoT introduces significant communication security challenges due to its heterogeneous components. Key agreement techniques, which establish symmetric encryption keys between communicating parties, are crucial for secure communications. However, the diversity and resource constraints of IoT devices present ongoing challenges. Existing studies on key agreement often focus on devices with specific conditions and specialized communication models. Their broader applicability is limited by that reason. This study addresses this gap by identifying and compiling the necessary features and conditions for key agreement algorithms in IoT environments. We survey key agreement methods to understand the different approaches in IoT using the Systematic Literature Review (SLR) method. This paper aims to categorize, analytically and statistically, the current research techniques on key agreement approaches in IoT published from 2016 to 2024. We present three technical taxonomies for the key agreement approaches in IoT based on the content of current studies. Our findings reveal that crucial parameters such as communication models, essential resources, and required tools are often overlooked in current IoT key management approaches. Notably, only 2% of the reviewed algorithms are lightweight and suitable for device-to-device communication models without prerequisites. This highlights a significant gap, as over 98% of existing algorithms either fail to meet the current requirements of IoT devices or are not easily implementable in the desired environment.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.