The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 49 of 283
Back to Result List

A Survey on Secure Group Communication Schemes With Focus on IoT Communication

Please always quote using this URN: urn:nbn:de:bvb:20-opus-300257
  • A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existingA key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.show moreshow less

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar Statistics
Metadaten
Author: Thomas Prantl, Timo Zeck, Andre Bauer, Peter Ten, Dominik Prantl, Ala Eddine Ben Yahya, Lukas Ifflaender, Alexandra Dmitrienko, Christian Krupitzer, Samuel Kounev
URN:urn:nbn:de:bvb:20-opus-300257
Document Type:Journal article
Faculties:Fakultät für Mathematik und Informatik / Institut für Informatik
Language:English
Parent Title (English):IEEE Access
Year of Completion:2022
Volume:10
First Page:99944
Last Page:99962
Source:IEEE Access 2022, 10:99944-99962. DOI: 10.1109/ACCESS.2022.3206451
DOI:https://doi.org/10.1109/ACCESS.2022.3206451
Dewey Decimal Classification:0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Tag:Internet of Things; encryption; secure group communication
Release Date:2023/04/04
Collections:Open-Access-Publikationsfonds / Förderzeitraum 2022
Licence (German):License LogoCC BY: Creative-Commons-Lizenz: Namensnennung 4.0 International