2017 IEEE Conference on Dependable and Secure Computing 2017
DOI: 10.1109/desec.2017.8073823
|View full text |Cite
|
Sign up to set email alerts
|

Secure group key distribution in constrained environments with IKEv2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…This allows a pair of nodes to perform authentication in an IKE-negotiated security association even when one node is too constrained to compute the required cryptographic functions supported by the IKE's security association policy [38]. Due to the wide adoption of IKE protocols, IKEv2 is remains a subject of interest in group authentication for constrained environments [39].…”
Section: A Ikev2mentioning
confidence: 99%
“…This allows a pair of nodes to perform authentication in an IKE-negotiated security association even when one node is too constrained to compute the required cryptographic functions supported by the IKE's security association policy [38]. Due to the wide adoption of IKE protocols, IKEv2 is remains a subject of interest in group authentication for constrained environments [39].…”
Section: A Ikev2mentioning
confidence: 99%
“…With increasing group sizes or geographical distribution, central management with its associated operations might become difficult, though. [8] In the next section we will compare and evaluate the suitability of Group Key Management Procedure (GKMP) [13], [14], Logical Key Hierachy (LKH) [30], One-way Function Tree (OFT) [41], Centralized Flate Table Key Management (CFKM) [39], Chinese Remaindering Group Key (CRGK) [42], CRT-GKM [38] and Central Authorized Key Extension (CAKE) [15] for LDACS.…”
Section: Selection Of Group Key Management Proceduresmentioning
confidence: 99%
“…Previous group key schemes (Felde et al, 2017) cannot be deployed directly since 1) they require a service center to store key directories, 2) they are not able to minimize the downtime during smart grid's operation, and 3) Most PMU/PDCs are equipped with limited memory and low-capacity micro-controllers, which tend to be restricted in their storage capability and computation.…”
Section: Key Exchangementioning
confidence: 99%