A Survey on Secure Group Communication Schemes With Focus on IoT Communication

被引:2
|
作者
Prantl, Thomas [1 ]
Zeck, Timo [1 ]
Bauer, Andre [1 ]
Ten, Peter [1 ]
Prantl, Dominik [1 ]
Ben Yahya, Ala Eddine [1 ]
Ifflaender, Lukas [1 ]
Dmitrienko, Alexandra [1 ]
Krupitzer, Christian [2 ]
Kounev, Samuel [1 ]
机构
[1] Julius Maximilians Univ Wurzburg, Dept Comp Sci, D-97074 Wurzburg, Germany
[2] Univ Hohenheim, Computat Sci Lab, D-70599 Hohenheim, Germany
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Cryptography; Security; Encryption; Internet of Things; Performance evaluation; Medical services; Wearable Health Monitoring Systems; Guidelines; Costs; Secure group communication (SGC); SGC classification; security features; performance metrics; communication costs; computation costs; guidelines; WIRELESS SENSOR NETWORKS; KEY MANAGEMENT; DYNAMIC GROUPS; PROTOCOL;
D O I
10.1109/ACCESS.2022.3206451
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.
引用
收藏
页码:99944 / 99962
页数:19
相关论文
共 50 条
  • [1] Benchmarking of Secure Group Communication schemes with focus on IoT
    Thomas Prantl
    André Bauer
    Simon Engel
    Lukas Horn
    Christian Krupitzer
    Lukas Iffländer
    Samuel Kounev
    [J]. Discover Data, 2 (1):
  • [2] Survey for Secure IoT group communication
    Park, Jiye
    Jung, Markus
    Rathgeb, Erwin P.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 1026 - 1031
  • [3] Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey
    Renugadevi, N.
    Swaminathan, G.
    Kumar, Aditya S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 446 - 450
  • [4] On the security of two signature schemes for secure communication in IoT environments
    Feihong Xu
    Hui Zeng
    [J]. Multimedia Tools and Applications, 2024, 83 : 43673 - 43683
  • [5] On the security of two signature schemes for secure communication in IoT environments
    Xu, Feihong
    Zeng, Hui
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (15) : 43673 - 43683
  • [6] Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols
    Hoglund, Rikard
    Tiloca, Marco
    Selander, Goran
    Mattsson, John Preuss
    Vucinic, Malisa
    Watteyne, Thomas
    [J]. IEEE ACCESS, 2024, 12 : 49865 - 49877
  • [7] A survey of key management for secure group communication
    Rafaeli, S
    Hutchison, D
    [J]. ACM COMPUTING SURVEYS, 2003, 35 (03) : 309 - 329
  • [8] Group rekeying schemes for secure group communication in wireless sensor networks
    Wang, Yong
    Ramamurthy, Byrav
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3419 - 3424
  • [9] A Survey on Secure Communication Protocols for IoT Systems (Invited Paper)
    Dragomir, Dan
    Gheorghe, Laura
    Costea, Sergiu
    Radovici, Alexandru
    [J]. 2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 47 - 62
  • [10] Axiom: DTLS-Based Secure IoT Group Communication
    Tiloca, Marco
    Nikitin, Kirill
    Raza, Shahid
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)