2022
DOI: 10.1109/access.2022.3206451
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Secure Group Communication Schemes With Focus on IoT Communication

Abstract: A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 72 publications
(161 reference statements)
0
2
0
Order By: Relevance
“…We present a brief introduction of these schemes within the past decade up to the time of writing. For a more detailed literature review on SGC, readers are recommended to read existing surveys [1], [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…We present a brief introduction of these schemes within the past decade up to the time of writing. For a more detailed literature review on SGC, readers are recommended to read existing surveys [1], [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…SePIP employs distributed group management schema without assuming trusted RSUs. Beyond the key management architecture, distinct group key generation has been applied in the literature [7]. Identity-Based Group Key Generation [8] is a cryptographic technique used to generate a shared secret key among a group.…”
Section: Introductionmentioning
confidence: 99%