- search hit 1 of 1
A Survey on Secure Group Communication Schemes With Focus on IoT Communication
Please always quote using this URN: urn:nbn:de:bvb:20-opus-300257
- A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existingA key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.…
Author: | Thomas Prantl, Timo Zeck, Andre Bauer, Peter Ten, Dominik Prantl, Ala Eddine Ben Yahya, Lukas Ifflaender, Alexandra Dmitrienko, Christian Krupitzer, Samuel Kounev |
---|---|
URN: | urn:nbn:de:bvb:20-opus-300257 |
Document Type: | Journal article |
Faculties: | Fakultät für Mathematik und Informatik / Institut für Informatik |
Language: | English |
Parent Title (English): | IEEE Access |
Year of Completion: | 2022 |
Volume: | 10 |
First Page: | 99944 |
Last Page: | 99962 |
Source: | IEEE Access 2022, 10:99944-99962. DOI: 10.1109/ACCESS.2022.3206451 |
DOI: | https://doi.org/10.1109/ACCESS.2022.3206451 |
Dewey Decimal Classification: | 0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik |
Tag: | Internet of Things; encryption; secure group communication |
Release Date: | 2023/04/04 |
Collections: | Open-Access-Publikationsfonds / Förderzeitraum 2022 |
Licence (German): | CC BY: Creative-Commons-Lizenz: Namensnennung 4.0 International |