Usage Areas. There is a correlation with usage areas of IoT systems and group key agreement proto- cols. For instance, ad hoc networks are good candidates to utilize efficient GKA protocols. In this area there are several proposals [6–8, 29], which are based on cluster structure. Since participants are grouped as clusters, the required group key computation effort is minimized in these smaller groups. Wireless sensor networks (WSN) is also another convenient area to implement GKA protocols. In [30], Lu et al. propose a three-factor GKA protocol which utilizes mutual authentication with Elliptic Curve Cryptography. Moreover, Challa et al. introduce a GKA protocol [31] for Wireless Healthcare sensor networks. This protocol provides high security, low computation and communication costs which are suitable for healthcare applications. Another GKA protocol is introduced by Tang et al. called PBAKA [32]. This protocol provides a solution for Body Area Networks (BANs) where multiple bio-sensors collect health-related information and provide intelligent health-care services. To solve authenticity, a control unit is used to initiate authentication via collected physiological features from the BAN sensors. These features are later utilized to negotiate session keys for the sensors. Another protocol introduced in this area is [33]. Vehicular Ad-hoc Networks (VANET) platform is another promising usage area for the group key agreement protocols. Islam et al. introduced a GKA protocol [34], which focuses on controlling city traffic via an efficient protocol. To provide efficiency, password-based authentication and group key generation are utilized instead of elliptic curve and bilinear- pairing which have significant computational cost.
Appears in 1 contract
Sources: Master's Thesis
Usage Areas. There is a correlation with usage areas of IoT systems and group key agreement proto- cols. For instance, ad hoc networks are good candidates to utilize efficient GKA protocols. In this area there are several proposals [6–8, 29], which are based on cluster structure. Since participants are grouped as clusters, the required group key computation effort is minimized in these smaller groups. Wireless sensor networks (WSN) is also another convenient area to implement GKA protocols. In [30], Lu ▇▇ et al. propose a three-factor GKA protocol which utilizes mutual authentication with Elliptic Curve Cryptography. Moreover, Challa ▇▇▇▇▇▇ et al. introduce a GKA protocol [31] for Wireless Healthcare sensor networks. This protocol provides high security, low computation and communication costs which are suitable for healthcare applications. Another GKA protocol is introduced by Tang ▇▇▇▇ et al. called PBAKA [32]. This protocol provides a solution for Body Area Networks (BANs) where multiple bio-sensors collect health-related information and provide intelligent health-care services. To solve authenticity, a control unit is used to initiate authentication via collected physiological features from the BAN sensors. These features are later utilized to negotiate session keys for the sensors. Another protocol introduced in this area is [33]. Vehicular Ad-hoc Networks (VANET) platform is another promising usage area for the group key agreement protocols. Islam et al. introduced a GKA protocol [34], which focuses on controlling city traffic via an efficient protocol. To provide efficiency, password-based authentication and group key generation are utilized instead of elliptic curve and bilinear- pairing which have significant computational cost.
Appears in 1 contract
Sources: Thesis Submission Agreement