Group Key Management in constrained IoT Settings
TUM published a new article about cryptographic key management at the 25th IEEE Symposium on Computers and Communications (ISCC)!
The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, intheir Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead.
This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.
You can find the article here: