4.7 Article

Group key management in the Internet of Things: Handling asynchronicity

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A Modern View on Forward Security

Colin Boyd et al.

Summary: Forward security is crucial in ensuring that compromise of current entities does not impact the security of cryptographic primitives used in the past, especially given the capabilities of adversaries today. Despite its existence for over 30 years, understanding of forward security is hindered by new techniques and inconsistent terminology. Existing methods for achieving forward security are surveyed, with proposals for new definitions and terminology to unify the concept.

COMPUTER JOURNAL (2021)

Article Computer Science, Information Systems

The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial

Mohamed Amine Ferrag et al.

Summary: This article presents research challenges and a tutorial on the performance evaluation of blockchain-based security and privacy systems for IoT. The article reviews existing surveys, blockchain applications in IoT, consensus algorithms, security analysis techniques, performance metrics, and open challenges. The study provides insights into building and evaluating blockchain-based security and privacy systems and highlights future research opportunities.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Efficient Byzantine Consensus Mechanism Based on Reputation in IoT Blockchain

Xu Yuan et al.

Summary: Blockchain technology has seen rapid advancement in various fields, particularly in large-scale IoT networks. Challenges arise when deploying IoT applications on blockchain systems due to limited storage, power, and computing capability of IoT devices, with consensus algorithms playing a significant role in ensuring system reliability and robustness.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Key Management Scheme for Secure Channel Establishment in Fog Computing

Lei Zhang

Summary: The paper proposes a key management scheme called DConBE for secure channel establishment in fog computing, allowing fog nodes to negotiate public encryption keys and decryption keys, achieving fog node dynamics, full collusion resistance, and statelessness.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Proceedings Paper Computer Science, Information Systems

Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees

Matthew Weidner et al.

Summary: This paper discusses a secure group messaging protocol for decentralized networks, introducing the concept of decentralized continuous group key agreement (DCGKA) as a new cryptographic primitive. It proves the security and efficiency of the protocol, providing forward secrecy and post-compromise security in the face of device compromises.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Article Computer Science, Information Systems

A Survey on Standards for Interoperability and Security in the Internet of Things

Euijong Lee et al.

Summary: There has been a rise in studies related to the Internet of Things in various fields, highlighting the importance of interoperability and security in achieving IoT system goals. International standards provide general methods to support interoperability and security, aiding in the development and management of systems efficiently. Adopting international standards is crucial to overcome barriers in IoT implementation.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Survey on Network Slicing for Internet of Things Realization in 5G Networks

Shalitha Wijethilaka et al.

Summary: Network slicing is a key technology in 5G architecture that enables the realization of IoT, dividing the physical network into multiple logical networks with different characteristics to meet diverse networking demands. This survey provides a comprehensive analysis of network slicing's utilization in IoT, addressing technical challenges and discussing integration challenges and open research problems. Integration of other emerging technologies like blockchain and AI/ML in network slicing and IoT integration is also explored.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Federated Learning for Internet of Things: A Comprehensive Survey

Dinh C. Nguyen et al.

Summary: The Internet of Things and artificial intelligence are increasingly intertwined in our daily lives, with Federated Learning emerging as a distributed collaborative AI approach that can play a vital role in intelligent IoT applications. This article provides a comprehensive survey of the emerging applications of FL in IoT networks and highlights its potential in various fields, paving the way for future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks

Anshul Anand et al.

WIRELESS NETWORKS (2020)

Article Computer Science, Hardware & Architecture

A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things

Mohamed Ali Kandi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Secure Authentication and Key Management With Blockchain in VANETs

Haowen Tan et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A survey on consensus methods in blockchain for resource-constrained IoT networks

Mehrdad Salimitari et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

GROUPIT: Lightweight Group Key Management for Dynamic IoT Environments

Yi-Hsuan Kung et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Theory & Methods

On Ends-to-Ends Encryption Asynchronous Group Messaging with Strong Security Guarantees

Katriel Cohn-Gordon et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Computer Science, Information Systems

Blockchains and Smart Contracts for the Internet of Things

Konstantinos Christidis et al.

IEEE ACCESS (2016)