A Survey on Secure Group Communication Schemes With Focus on IoT Communication
Zitieren Sie bitte immer diese URN: urn:nbn:de:bvb:20-opus-300257
- A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existingA key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.…
Autor(en): | Thomas Prantl, Timo Zeck, Andre Bauer, Peter Ten, Dominik Prantl, Ala Eddine Ben Yahya, Lukas Ifflaender, Alexandra Dmitrienko, Christian Krupitzer, Samuel Kounev |
---|---|
URN: | urn:nbn:de:bvb:20-opus-300257 |
Dokumentart: | Artikel / Aufsatz in einer Zeitschrift |
Institute der Universität: | Fakultät für Mathematik und Informatik / Institut für Informatik |
Sprache der Veröffentlichung: | Englisch |
Titel des übergeordneten Werkes / der Zeitschrift (Englisch): | IEEE Access |
Erscheinungsjahr: | 2022 |
Band / Jahrgang: | 10 |
Erste Seite: | 99944 |
Letzte Seite: | 99962 |
Originalveröffentlichung / Quelle: | IEEE Access 2022, 10:99944-99962. DOI: 10.1109/ACCESS.2022.3206451 |
DOI: | https://doi.org/10.1109/ACCESS.2022.3206451 |
Allgemeine fachliche Zuordnung (DDC-Klassifikation): | 0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik |
Freie Schlagwort(e): | Internet of Things; encryption; secure group communication |
Datum der Freischaltung: | 04.04.2023 |
Sammlungen: | Open-Access-Publikationsfonds / Förderzeitraum 2022 |
Lizenz (Deutsch): | CC BY: Creative-Commons-Lizenz: Namensnennung 4.0 International |