Group Key Management in Internet of Things: A Systematic Literature Review


Creative Commons License

Samiullah F., Gan M. L., Akleylek S., Aun Y.

IEEE Access, cilt.11, ss.77464-77491, 2023 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 11
  • Basım Tarihi: 2023
  • Doi Numarası: 10.1109/access.2023.3298024
  • Dergi Adı: IEEE Access
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.77464-77491
  • Anahtar Kelimeler: cryptography, Group key management, IoTs, post-quantum, Secure group communication
  • Ondokuz Mayıs Üniversitesi Adresli: Evet

Özet

IoT networks are gaining popularity in terms of group networks built by sensor nodes and other IoT-related devices. The significance of cryptography protocols for secure communication among nodes in such networks cannot be overstated. Effective point-to-point and multicast communication among groups of nodes is of paramount importance. The security of IoT necessitates the concealment of security protocols and keys that are transmitted between nodes. The management of group keys, commonly referred to as Group Key Management (GKM), is an essential component of secure group communication protocols. It is imperative to develop a Secure Group Communication (SCG) scheme that is designed for practical scenarios, taking into consideration the demands and constraints of real-life implementations. In addition, most of the existing GKM schemes are dependent on public-key cryptography which are vulnerable to quantum computers. This SLR evaluates 48 proposals identified in IEEE Xplore, Springer Link, MDPI, ScienceDirect, Scopus, and Hindawi databases between 2013 and 2023. Moreover, we provide a classification of secure group communication schemes. In addition, we conduct a comprehensive performance and security evaluation of the SGC schemes. In addition to other security features, we consider quantum resistance to be one of the security features, and we describe the application and usage area considering a resource-constrained real-world scenario where GKM is the most important issue.