2016
DOI: 10.1007/978-3-319-49100-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multicast Group Management and Key Distribution in IEEE 802.21

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Our verification result differs from security analyses in [3], [27] as follows: First, the security analysis in [3] is for a device authentication protocol based on the GKM scheme in IEEE 802.21. However, the security proof of the part of the GKM scheme is omitted.…”
Section: Comparison To Previous Workmentioning
confidence: 81%
See 3 more Smart Citations
“…Our verification result differs from security analyses in [3], [27] as follows: First, the security analysis in [3] is for a device authentication protocol based on the GKM scheme in IEEE 802.21. However, the security proof of the part of the GKM scheme is omitted.…”
Section: Comparison To Previous Workmentioning
confidence: 81%
“…However, the security proof of the part of the GKM scheme is omitted. Next, in [27], indistinguishability of the group key of the GKM scheme (with the digital signature option) is proved. However, security of the GKM scheme without the digital signature option is not analysed.…”
Section: Comparison To Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the group key management (GKM) scheme of IEEE 802.21 [1] is used to establish a common group key for each group. Although some existing works [2] [26] gave security analysis of the scheme, hand-written security proofs are error-prone. Hence, security verification by formal methods is important in order to guarantee rigorous security.…”
Section: Introductionmentioning
confidence: 99%