2013
DOI: 10.1016/j.adhoc.2013.05.009
|View full text |Cite
|
Sign up to set email alerts
|

A novel batch-based group key management protocol applied to the Internet of Things

Abstract: Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a common secret key, denoted as ''group key'', shared by multiple communication endpoints. In this work, we propose a novel centralized approach to efficiently distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 85 publications
(27 citation statements)
references
References 30 publications
0
26
0
Order By: Relevance
“…As mentioned in Qiu et al, 40 the centralized approach deploys a single entity for controlling the whole group; hence, a group key management protocol seeks to minimize storage requirements, computational overhead and bandwidth utilization, and network traffic caused by users' joins and leaves. 41 The distributed key management mechanism uses a key group that is built by every group member attached to the RSU. The distributed key management framework proposed in Hao et al 42 is based on group signature, where each RSU acts as the key distributor for the group and all group members contribute to the group key with their signature.…”
Section: Key Management Mechanismmentioning
confidence: 99%
“…As mentioned in Qiu et al, 40 the centralized approach deploys a single entity for controlling the whole group; hence, a group key management protocol seeks to minimize storage requirements, computational overhead and bandwidth utilization, and network traffic caused by users' joins and leaves. 41 The distributed key management mechanism uses a key group that is built by every group member attached to the RSU. The distributed key management framework proposed in Hao et al 42 is based on group signature, where each RSU acts as the key distributor for the group and all group members contribute to the group key with their signature.…”
Section: Key Management Mechanismmentioning
confidence: 99%
“…If the mutual trust among clients in terms of confidentiality is not desired, OSCAR puts the burden on the key management scheme running on Authorization Servers. One such example would be the use of a recently proposed batch-based group key management protocol [16], where clients would be given cryptographic material corresponding to descendants in the binary tree of the actual access secret on a server. However, this would require additional signaling of the supported access secret in the GET request.…”
Section: Security Considerationsmentioning
confidence: 99%
“…• WiSMote platform based on 16 To eliminate the effect of a variable CPU frequency on results, we have configured both platforms at 21.3 MHz. MSP430 series 5 may be configured up to 24 MHz, while the STM32L can go up to 32 MHz.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Luca Veltri et al [4] have proposed a new centralized approach for efficiently distributing and managing a group key in generic ad hoc networks and Internet of Things. Owing to group membership changes caused by users' joins and leaves, this approach minimizes the computational overhead and network traffic.…”
Section: Centralized Group Key Management Techniquesmentioning
confidence: 99%