2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2018
DOI: 10.23919/softcom.2018.8555857
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Multi-Group Key Management Protocol for Internet of Things

Abstract: Internet of Things (IoT) is a network made up of a large number of devices which are able to automatically communicate to computer systems, people and each other providing various services for the benefit of society. One of the main challenges facing the IoT is how to secure communication between these devices. Among all the issues, the Group Key Management is one of the most difficult. Although different approaches have been proposed to solve it, most of them use the same security parameters to secure all com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…In this section simulation results are presented for energy consumption, resilience and rekeying operations. We have compared results with base schemes GKM [13], RiSeG [15] and LNT [20]. The proposed scheme is simulated using NS2.35 with C language on Fedora core-16.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In this section simulation results are presented for energy consumption, resilience and rekeying operations. We have compared results with base schemes GKM [13], RiSeG [15] and LNT [20]. The proposed scheme is simulated using NS2.35 with C language on Fedora core-16.…”
Section: Results and Analysismentioning
confidence: 99%
“…A highly scalable multi-group keying for IoT is proposed to ensure the backward and forward secrecy. It also ensures the co-existence of variety of related services in the same region along with independent security parameters [15]. Kung and Hsiao have presented a lightweight scheme for group key management in dynamic IoT scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the capture of a member will jeopardize all services. In previous works [26,27], we proposed algorithms that provide various mechanisms to resolve some of these problems. However, these works do not consider Device-to-Device Communication.…”
Section: ) Discussionmentioning
confidence: 99%
“…Unlike most of the existing GKM schemes, our solution balances the loads between the heterogeneous devices of the network according to their capabilities. To illustrate this difference, we consider the protocols MGKMP [26] and GREP [45]. The authors show that their calculation and storage costs are proportional to O( √ n) for all the network members, while they are both proportional to the nodes' storage capability, using our solution.…”
Section: ) Efficiency and Scalabilitymentioning
confidence: 99%
See 1 more Smart Citation