Group Key Management in constrained IoT Settings

TUM published a new article about cryptographic key management at the 25th IEEE Symposium on Computers and Communications (ISCC)!

The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, intheir Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead.

This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.

You can find the article here:

Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars, “Group Key Management in Constraint IoT Settings,” in 25th IEEE Symposium on Computers and Communications (ISCC), July 2020

Christian Luebben

Christian Lübben is a research associate and PhD student at the chair of Network Architectures and Services at Technical University of Munich. Within the Internet of Things (IoT) Smart Space team (S2O) his research focus lies on optimizing IoT smart spaces using AI based advanced data analytics. The S2O team works on new ways of taming the complexity of the IoT. The goal is making a joint orchestration as simple as writing a smartphone App. Challenges include security, usability, resilience, scalability, and performance.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.