2018 Fifth International Conference on Internet of Things: Systems, Management and Security 2018
DOI: 10.1109/iotsms.2018.8554829
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Group-Key Establishment Protocol for IoT Devices: Implementation and Performance Analyses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…For group authentication and key management, researchers have put forth a number of methods, including effective Group Key Establishment (GKE) and GKM schemes. Schemes for GKE have been designed for resourceconstrained network architectures by applying ECC in [25], [26]. The authors of [8] and [9] discuss several key graph types that are utilised for the user-device structure and how they affect communication and processing costs.…”
Section: Related Workmentioning
confidence: 99%
“…For group authentication and key management, researchers have put forth a number of methods, including effective Group Key Establishment (GKE) and GKM schemes. Schemes for GKE have been designed for resourceconstrained network architectures by applying ECC in [25], [26]. The authors of [8] and [9] discuss several key graph types that are utilised for the user-device structure and how they affect communication and processing costs.…”
Section: Related Workmentioning
confidence: 99%
“…Other than key tree based methods, there exist a variety of non-interactive key agreement protocols [12][13][14][15][16] which are applicable to WSNs or IoT networks. A secure group key establishment based on Elliptic Curve Cryptographic (ECC) operations was proposed in [12] for IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…Other than key tree based methods, there exist a variety of non-interactive key agreement protocols [12][13][14][15][16] which are applicable to WSNs or IoT networks. A secure group key establishment based on Elliptic Curve Cryptographic (ECC) operations was proposed in [12] for IoT networks. In this work, the authors have used one-way cryptographic accumulators to enable the connection between the gateway and IoT nodes to establish secure group keys and use them for further communications.…”
Section: Related Workmentioning
confidence: 99%
“…In [3], the authors propose an efficient and lightweight 3-factor authentication and key establishment scheme, based on Biohashing and the Rabin Cryptosystem, for WSNs to securely connect to the Internet. Elliptic Curve Cryptography has also found novel applications in designing keying protocols for constrained network architectures [18]- [21]. Online validation of public key certificates is another problem in the field of IoT security.…”
Section: Related Workmentioning
confidence: 99%