2021
DOI: 10.1002/cpe.6553
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad‐hoc networks

Abstract: Group key management with privacy preserving and trust still remains a precarious and stimulating issue for securing multicast communications in an energy embarrassed large wireless ad-hoc networks (WANETs). To address this, few researchers with the adaption of blockchain technology and practical usage of a privacy-preserving smart contract as group controller made these group key agreements adaptable to WANET. However, proportionate to the increase in the size of the group, the processing load on the smart co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…For intelligent Internet of Things (IoT) systems, Zhang et al [19] created the GKA protocol, which enabled a rational terminal to form a group key with a threshold requirement. Sharding and blockchain technologies were integrated into GKA by Naresh et al [20] to reduce the computational and communication costs of the group controller. The group has been distributed into the r subgroup, which was used to generate the hierarchical group keys.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
See 1 more Smart Citation
“…For intelligent Internet of Things (IoT) systems, Zhang et al [19] created the GKA protocol, which enabled a rational terminal to form a group key with a threshold requirement. Sharding and blockchain technologies were integrated into GKA by Naresh et al [20] to reduce the computational and communication costs of the group controller. The group has been distributed into the r subgroup, which was used to generate the hierarchical group keys.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
“…The previous literature studies [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26] had several limitations, which can be specified in three facts: Firstly, the group key agreements that were reviewed in the related works were required to broadcast and exchange many messages between the controller and the group members, which might have exposed the group shared key (GSK) and increased the communication and computation costs. Second, some protocols did not consider the group member authentication and message integrity, thereby facilitating the MITM attack.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
“…Additionally, the utilized DSs represent ID pointers to miners, which raises concerns regarding linkage attacks possibility in public BCs. Yes q ≤ 1/4 Yes Randomized Ostraka [86] Yes N/A No Randomized SBSCH-GKA [89] Yes N/A Yes N/A Cycledger [90] Yes f ≤ N/3 Yes Randomized RepChain [91] Yes f ≤ N/3 Yes Randomized SSHC [92] Yes q ≤ 1/3 Yes Randomized RapidChain [93] No…”
Section: ) Security and Privacymentioning
confidence: 99%
“…When variations occur, the adjacent node begins the rekeying action hence decreasing the load on the cluster head. The group head selects a random key to be used for encrypting the swapped among the cluster heads and the network head sends the key to the group head that is used for communication among the cluster head 18,19 …”
Section: Introductionmentioning
confidence: 99%
“…The group head selects a random key to be used for encrypting the swapped among the cluster heads and the network head sends the key to the group head that is used for communication among the cluster head. 18,19 Group key agreement is better than key distribution for secure communication: Key distribution: Peer group communication is better suited for distributed group key management, particularly unreliable networks. It entails choosing a group member dynamically who serves as a key distribution server.…”
Section: Introductionmentioning
confidence: 99%