Benchmarking of Secure Group Communication schemes with focus on IoT

Author:

Prantl Thomas,Bauer André,Engel Simon,Horn Lukas,Krupitzer Christian,Iffländer Lukas,Kounev Samuel

Abstract

AbstractAs Internet of Things (IoT) devices become ubiquitous, they face increasing cybersecurity threats. Unlike standard 1-to-1 communication, the unique challenge posed by n-to-n communication in IoT is that messages must not be encrypted for a single recipient but for a group of recipients. For this reason, using Secure Group Communication (SGC) schemes is necessary to encrypt n-to-n communication efficiently for large group sizes. To this end, the literature presents various SGC schemes with varying features, performance profiles, and architectures, making the selection process challenging. A selection from this multitude of SGC schemes should best be made based on a benchmark that provides an overview of the performance of the schemes. Such a benchmark would make it much easier for developers to select an SGC scheme, but such a benchmark still needs to be created. This paper aims to close this gap by presenting a benchmark for SGC schemes that focus on IoT. Since the design of a benchmark first requires the definition of the underlying business problems, we defined suitable problems for using SGC schemes in the IoT sector as the first step. We identified a common problem for the centralized and decentralized/hybrid SGC schemes, whereas the distributed/contributory SGC schemes required defining an independent business problem. Based on these business problems, we first designed a specification-based benchmark, which we then extended to a hybrid benchmark through corresponding implementations. Finally, we deployed our hybrid benchmark in a typical IoT environment and measured and compared the performance of different SGC schemes. Our findings reveal notable impacts on calculation times and storage requirements without a trusted Central Instance (CI) in distributed/contributory SGC schemes.

Funder

Julius-Maximilians-Universität Würzburg

Publisher

Springer Science and Business Media LLC

Reference51 articles.

1. Perrone G, Vecchio M, Pecori R, Giaffreda R. The day after mirai: a survey on mqtt security solutions after the largest cyber-attack carried out through an army of iot devices, in Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (SCITEPRESS - Science and Technology Publications, 2017). https://doi.org/10.5220/0006287302460253.

2. Turton W. Verkada says hackers accessed cameras of 95 customers (2021). https://news.bloomberglaw.com/tech-and-telecom-law/verkada-says-hackers-accessed-cameras-of-95-customers. Accessed 8 Jun 2023.

3. Cheikhrouhou O. Secure group communication in wireless sensor networks: a survey. J Netw Comput Appl. 2016;61:115–32. https://doi.org/10.1016/j.jnca.2015.10.011.

4. Icons8, Key icon in iOS Style. https://icons8.com/icon/555/key. Accessed 10 Apr 2024.

5. Icons8, Lock icon in iOS Style. https://icons8.com/icon/94/sperren. Accessed 10 Apr 2024.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3