“…The majority of CK-GKAs' [18,20,21,25,26,30,31,35,39,[40][41][42] presume a hierarchical framework of the clusters or hierarchical structure, then execute a natural key agreement schemes such as, D-H [34] or the Burmester and Desmedt (BD) [3] GKA scheme, or a variety GKA schemes [3,7,16,[35][36][37][38][39] is at first implemented locally in each cluster, after that utilize these CKs in the next level with equivalent or an alternate key agreement scheme among CHs' to generate the whole group key. For further information on a comparison of the existing protocols [18,21,25,26,28,30,31,33,43] in this direction, one can refer to Table 2, summary of the key characteristics of cluster based protocols.…”