News

New publication in IEEE Access  [27.10.22]

Christian Krupitzer from the Department of Food Informatics is Co-Author of the publication "A Survey on Secure Group Communication Schemes With Focus on IoT Communication" in IEEE Access (Impact Factor: 3.476 (2021)).

 

The publication "A Survey on Secure Group Communication Schemes With Focus on IoT Communication" by Thomas Prantl (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany) with the co-authors, Timo Zeck (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Andre Bauer (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Peter Ten (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Dominik Prantl (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Ala Eddine Ben Yahya (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Lukas Ifflaender (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Alexandra Dmitrienko (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany), Christian Krupitzer (Computational Science Laboratory, University of Hohenheim, Hohenheim, Germany), Samuel Kounev (Department of Computer Science, Julius-Maximilians-University of Würzburg, Würzburg, Germany) was published in IEEE Access, IEEE (Impact Factor: 3.476 (2021)).

A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclopedia by creating a sub-encyclopedia for secure group communication (SGC) schemes, which belong to the n-to-n category. We extensively surveyed the state-of-the-art and classified 47 different schemes. More precisely, we provide (i) a comprehensive overview of the relevant security features, (ii) a set of relevant performance metrics, (iii) a classification for secure group communication schemes, and (iv) workflow descriptions of the 47 schemes. Moreover, we perform a detailed performance and security evaluation of the 47 secure group communication schemes. Based on this evaluation, we create a guideline for the selection of secure group communication schemes.

The publication is available at: ieeexplore.ieee.org/document/9889732

 

 


Back to Latest News