{"title":"受限网络中的安全组通信——差距分析","authors":"T. Guggemos, N. Felde, D. Kranzlmüller","doi":"10.1109/GIOTS.2017.8016270","DOIUrl":null,"url":null,"abstract":"In constrained networks, multicasting may be preferred over unicasting because of its better energy footprint. The inherent necessity of group management makes securing multicasting specially challenging. This work introduces a characterization of secure group communication and specifies the properties to be achieved. The security properties are derived from ISO/IEC 27000 and adopted to the specialties of multicasting. A validation of state-of-the-art security solutions in constrained networks against the criteria proves the need for future investigations and improvements, especially in the area of sender authentication.","PeriodicalId":413939,"journal":{"name":"2017 Global Internet of Things Summit (GIoTS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure group communication in constrained networks — A gap analysis\",\"authors\":\"T. Guggemos, N. Felde, D. Kranzlmüller\",\"doi\":\"10.1109/GIOTS.2017.8016270\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In constrained networks, multicasting may be preferred over unicasting because of its better energy footprint. The inherent necessity of group management makes securing multicasting specially challenging. This work introduces a characterization of secure group communication and specifies the properties to be achieved. The security properties are derived from ISO/IEC 27000 and adopted to the specialties of multicasting. A validation of state-of-the-art security solutions in constrained networks against the criteria proves the need for future investigations and improvements, especially in the area of sender authentication.\",\"PeriodicalId\":413939,\"journal\":{\"name\":\"2017 Global Internet of Things Summit (GIoTS)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Global Internet of Things Summit (GIoTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GIOTS.2017.8016270\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Global Internet of Things Summit (GIoTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GIOTS.2017.8016270","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure group communication in constrained networks — A gap analysis
In constrained networks, multicasting may be preferred over unicasting because of its better energy footprint. The inherent necessity of group management makes securing multicasting specially challenging. This work introduces a characterization of secure group communication and specifies the properties to be achieved. The security properties are derived from ISO/IEC 27000 and adopted to the specialties of multicasting. A validation of state-of-the-art security solutions in constrained networks against the criteria proves the need for future investigations and improvements, especially in the area of sender authentication.