DECENT project

Decentralized Cross-commodity Energy Management

Group Key Management in constrained IoT Settings

TUM published a new article about cryptographic key management at the 25th IEEE Symposium on Computers and Communications (ISCC)!

The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, intheir Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead.

This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.

You can find the article here:

Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars, “Group Key Management in Constraint IoT Settings,” in 25th IEEE Symposium on Computers and Communications (ISCC), July 2020

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.