2018
DOI: 10.1007/978-3-319-78816-6_22
|View full text |Cite
|
Sign up to set email alerts
|

Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups

Abstract: Securing collaborative applications relies heavily on the underlying group key management protocols. Designing these protocols is challenging, especially in the context of the Internet of Things (IoT). Indeed, the presence of heterogeneous and dynamic members within the collaborative groups usually involves resource constrained entities, which require energy-aware protocols to manage frequent arrivals and departures of members. Moreover, both fault tolerance and scalability are sought for sensitive and large c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 33 publications
0
10
0
1
Order By: Relevance
“…To evaluate the computation overhead, we simulate the cryptographic operations with Miracle Library. It is a cryptographic library designed for use in constrained environments in terms of computational power [26]. All simulations are implemented on a computer with the following features: an Intel i5-4200 CPU@ 2.5 GH with a physical memory of 8 GB; and Ubuntu 12.04 OS over VMware workstation 15.…”
Section: B Computation Overheadmentioning
confidence: 99%
See 1 more Smart Citation
“…To evaluate the computation overhead, we simulate the cryptographic operations with Miracle Library. It is a cryptographic library designed for use in constrained environments in terms of computational power [26]. All simulations are implemented on a computer with the following features: an Intel i5-4200 CPU@ 2.5 GH with a physical memory of 8 GB; and Ubuntu 12.04 OS over VMware workstation 15.…”
Section: B Computation Overheadmentioning
confidence: 99%
“…Nevertheless, [14] does not ensure communication between multiple groups and it requires large storage and computation resources. Their work was enhanced to decrease the communication overhead by adopting a Distributed Batchbased Group Key [26]. It is based on polynomial cryptography to set up the key for collaborative groups in the IoT environment.…”
mentioning
confidence: 99%
“…A very extensive analysis of GKM systems can be found in [ 11 ]. Dammak et al in [ 11 ] analyze the properties of GKM systems due to their applications for: wireless body area networks (WBAN) [ 12 ], wireless sensor networks (WSN) [ 13 , 14 , 15 ], cloud computing [ 16 ], wireless IPv6 networks [ 17 ], and IoT [ 18 , 19 , 20 ]. They compare solutions for individual groups of GKM applications, taking into account many attributes, the most important of which are: key distribution schemes (i.e., centralized, decentralized, distributed [ 21 ]), cryptography type used (symmetric, asymmetric, polynomial, Attribute Based Encryption), forward and backward secrecy (the shared key must be updated when a new node joins the group or some node leaves the group), mutual key independence, existence of single point of failure, and scalability.…”
Section: Related Workmentioning
confidence: 99%
“…The application of multicast is mandatory in the IoT field as its application was widely used by numerous healthcare, environmental monitoring, smart cities, and smart homes [8,42]. In secure-key management, a common method was involved to maximize the capacity of transmitted packets encryption or decryption.…”
Section: Overview Of Multicast Ipmentioning
confidence: 99%
“…Here 'n' represents the total number of cluster members. So, this solution was found to be not applicable for dynamic and large groups [20,42]. The fusion of signalling load and rekeying messages between the core network and members introduce the communication overhead.…”
Section: Pairwise Keysmentioning
confidence: 99%