• Treffer 5 von 5
Zurück zur Trefferliste

A Survey on Secure Group Communication Schemes With Focus on IoT Communication

Zitieren Sie bitte immer diese URN: urn:nbn:de:bvb:20-opus-300257
  • A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existingA key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.zeige mehrzeige weniger

Volltext Dateien herunterladen

Metadaten exportieren

Weitere Dienste

Teilen auf Twitter Suche bei Google Scholar Statistik - Anzahl der Zugriffe auf das Dokument
Metadaten
Autor(en): Thomas Prantl, Timo Zeck, Andre Bauer, Peter Ten, Dominik Prantl, Ala Eddine Ben Yahya, Lukas Ifflaender, Alexandra Dmitrienko, Christian Krupitzer, Samuel Kounev
URN:urn:nbn:de:bvb:20-opus-300257
Dokumentart:Artikel / Aufsatz in einer Zeitschrift
Institute der Universität:Fakultät für Mathematik und Informatik / Institut für Informatik
Sprache der Veröffentlichung:Englisch
Titel des übergeordneten Werkes / der Zeitschrift (Englisch):IEEE Access
Erscheinungsjahr:2022
Band / Jahrgang:10
Erste Seite:99944
Letzte Seite:99962
Originalveröffentlichung / Quelle:IEEE Access 2022, 10:99944-99962. DOI: 10.1109/ACCESS.2022.3206451
DOI:https://doi.org/10.1109/ACCESS.2022.3206451
Allgemeine fachliche Zuordnung (DDC-Klassifikation):0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Freie Schlagwort(e):Internet of Things; encryption; secure group communication
Datum der Freischaltung:04.04.2023
Sammlungen:Open-Access-Publikationsfonds / Förderzeitraum 2022
Lizenz (Deutsch):License LogoCC BY: Creative-Commons-Lizenz: Namensnennung 4.0 International