2015
DOI: 10.1515/cait-2015-0038
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Group Key Management Schemes

Abstract: Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…Many researchers have proposed many solutions to ensure the security of group keys. These solutions are generally divided into the following three types [ 12 , 13 ].…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers have proposed many solutions to ensure the security of group keys. These solutions are generally divided into the following three types [ 12 , 13 ].…”
Section: Related Workmentioning
confidence: 99%
“…In a centralized system [2], a single entity is responsible to complete group communication. Using this single entity we have to manage key generation, distribution.…”
Section: Centralized Group Key Managementmentioning
confidence: 99%
“…Shared key agreement protocol is an important key protocol, every group member consults shared key with key agreement protocol on public channel [1,2], the method can build security channel in semi honest networks and is suitable to distributed network [3], such as sensor networks [4], Ad Hoc networks [5,6],underwater networks [7], flying Ad Hoc networks [8]. With the improvement of the hardware capability of network members, the delay overhead is restricted by the speed of signal transmission, more interactions incur more time delay, thus reducing the time delay becomes the primary goal of group key management [9].…”
Section: Introductionmentioning
confidence: 99%