Group key Management in Resource Constraint Environment: Applications and Use Cases


Abstract views: 171 / PDF downloads: 97

Authors

  • FOUZIA SAMIULLAH Universiti Tunku Abdul Rahman
  • SEDAT AKEYLEK Ondokuz Mayis University and IAM
  • MING LEE GAN Universiti Tunku Abdul Rahman
  • Y AUN Universiti Tunku Abdul Rahman

DOI:

https://doi.org/10.59287/ijanser.419

Keywords:

Group Key Management, Secure Group Communication, Resource Constrained, Applications, Use Cases

Abstract

In today's interconnected world, where several endpoints require data sharing in the most effective and concurrently secure manner, group communication is a crucial mode of communication. Especially in the confined surroundings introduced by the Internet of Things and sensor networks, the ensuing complexity constitutes a significant issue. Group key Management (GKM) is a vital function in schemes for secure group communication. Secure group communication scheme (SCG) should be created for realistic circumstances because they must account for the requirements and limits of real-world applications. This covers elements such as network latency, bandwidth constraints, processing resources available on devices used by end-users, and so on. By creating schemes that are customized to these settings, it is possible to improve performance and usability in the field while preserving robust security assurances against adversary assaults. This paper evaluated various use-cases and their accompanying applications in which group key management is a major concern, as well as emphasizing some of the unresolved issues that must be addressed in a variety of circumstances.

Downloads

Download data is not yet available.

Author Biographies

FOUZIA SAMIULLAH, Universiti Tunku Abdul Rahman

The Faculty of Information and Communication Technology, Petaling Jaya, Perak 31900, Malaysia

SEDAT AKEYLEK, Ondokuz Mayis University and IAM

Department of Computer Engineering, METU, Turkey

MING LEE GAN, Universiti Tunku Abdul Rahman

The Faculty of Information and Communication Technology, Petaling Jaya, Perak 31900, Malaysia

Y AUN, Universiti Tunku Abdul Rahman

The Faculty of Information and Communication Technology, Petaling Jaya, Perak 31900, Malaysia

References

“41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025,” 2019.

A. ALBAKRI, “Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks,” IEEE Access, p. 9, 2019.

N. Hegde, “Secure Group Key Management Scheme for Dynamic Vehicular Cloud Computing,” Int. J. Advanced Networking and Applications, vol. 13, no. 1, pp. 4821-4826, 2021.

S. Zhang, “Group Key Management Protocol for File Sharing on Cloud Storage,” IEEE Access, vol. 8, pp. 123614 - 123622, 2020.

R. V. Rao, “Hierarchical group key management for secure data sharing in a cloud-based environment,” Special Issue:Advanced Algorithms for IoT Cloud computing and Cyber‐Enabled Applications (ICAMMAET‐ICTPACT2018), vol. 31, no. 12, 2018.

Z. Wang, “A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid,” MDPI, vol. 14, no. 4, 2022.

H. Tan, “A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs,” MDPI sensors, vol. 18, no. 11, p. 3930, 2018, ; https://doi.org/10.3390/s18113930.

T. Ewert, “Group Key Distribution Procedures for the L-Band Digital Aeronautical Communications System (LDACS),” in 2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), San Antonio, TX, USA, 2021.

Z. Wang, “A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid,” Future Internet 2022 ; https://doi.org/10.3390/fi14040119, vol. 14, no. 4, p. 119, 2022.

C. Chen, “A secure blockchain-based group key agreement protocol for IoT,” SpringerLink, vol. 77, p. 9046–9068, 2021.

Q. CHENG, “Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN,” IEEE ACCESS, Vols. 8, 2020, no. April 29, 2020, p. 7, 2020.

H. Nicanfar, “Password-authenticated cluster-based group key agreement for smart grid communication,” https://doi.org/10.1002/sec.726, vol. 7, no. 1, pp. 221-233, 2014.

A. M. Perumal, “Architectural framework of a group key management system for enhancing e-healthcare data security,” IET, Vols. 7 ,https://doi.org/10.1049/htl.2018.5114, no. 1, pp. 1-12, 2019 .

S. Iqbal, “Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients,” SpringerLink, vol. 9, p. pages93–111, 2019.

H. TAN, “Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor,” IEEE Access, vol. 7, no. 2019, p. 16, 2019.

A. Rivero-García, “Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange,” MDPI sensors, vol. doi: 10.3390/s17040733, no. 4, 2017.

A. Musuroi, “Fast and Efficient Group Key Exchange in Controller Area Networks (CAN),” IEEE Transactions on Vehicular Technology, vol. 70, no. 9, pp. 9385 - 9399, 2021.

Q. Liu, “Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding,” Sensors , vol. 20, no. 4, p. 1138, 2020.

E. Fernandes, “Security Analysis of Emerging Smart Home Applications,” in In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 2016.

G. K. a. E. K. S. Saini, “Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things,” in Springer Singapore, Singapore, 06 July 2017.

Y.-H. Kung, “GROUPIT: Lightweight Group Key Management for Dynamic IoT Environments,” IEEE INTERNET OF THINGS JOURNAL, Vols. VOL. 5, NO. 6, no. DECEMBER 2018, p. 11, 2018.

[Online]. Available: PARFAIT. [Online]. Available: http://www.itea3-parfait.com/.

M. Dammak, “Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, Vols. VOL. 17, NO. 3, no. SEPTEMBER 2020, p. 16, 2020.

Downloads

Published

2023-04-15

How to Cite

SAMIULLAH, F., AKEYLEK, S., LEE GAN, M., & AUN, Y. (2023). Group key Management in Resource Constraint Environment: Applications and Use Cases. International Journal of Advanced Natural Sciences and Engineering Researches, 7(3), 269–278. https://doi.org/10.59287/ijanser.419

Issue

Section

Articles