{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:21:00Z","timestamp":1775308860504,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030028060","type":"print"},{"value":"9783030028077","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02807-7_3","type":"book-chapter","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T14:32:49Z","timestamp":1544711569000},"page":"43-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure Multicast Communication Techniques for IoT"],"prefix":"10.1007","author":[{"given":"Subho Shankar","family":"Basu","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"issue":"5","key":"3_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MWC.2007.4396938","volume":"14","author":"Pitipatana Sakarindr","year":"2007","unstructured":"Sakarindr, P., Ansari, N.: Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wirel. Commun. 14(5) (2007)","journal-title":"IEEE Wireless Communications"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Basu, S.S., Tripathy, S.: Securing multicast group communication in IoT enabled systems. IETE Tech. Rev. (2018) (accepted)","DOI":"10.1080\/02564602.2017.1407681"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., Towsley, D., Vasudevan, S., Zhang, C.: Secure group communications for wireless networks. In: Military Communications Conference, MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 113\u2013117. IEEE (2001)","DOI":"10.1109\/MILCOM.2001.985773"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TNET.2004.833129","volume":"12","author":"Y Sun","year":"2004","unstructured":"Sun, Y., Trappe, W., Liu, K.R.: A scalable multicast key management scheme for heterogeneous wireless networks. IEEE\/ACM Trans. Netw. 12(4), 653\u2013666 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, S.K., Cherukuri, S.: An adaptive protocol for efficient and secure multicasting in IEEE 802.11 based wireless lans. In: Wireless Communications and Networking, WCNC 2003, vol. 3, pp. 2021\u20132026. IEEE (2003)","DOI":"10.1109\/WCNC.2003.1200697"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Westerhoff, L., Reinhardt, S., Schafer, G., Wolisz, A.: Security analysis and concept for the multicast-based handover support architecture Mombasa. In: Global Telecommunications Conference, GLOBECOM\u201904, vol. 4, pp. 2201\u20132207. IEEE (2004)","DOI":"10.1109\/GLOCOM.2004.1378400"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1109\/ACCESS.2015.2474705","volume":"3","author":"P Porambage","year":"2015","unstructured":"Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503\u20131511 (2015)","journal-title":"IEEE Access"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in CryptologyCRYPTO 2001, pp. 213\u2013229. Springer (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP\u201907, California, USA, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Wang, C.-J., Luo, J.-F.: A key-policy attribute-based encryption scheme with constant size ciphertext. In: 2012 Eighth International Conference on Computational Intelligence and Security (CIS), Guangzhou, China, pp. 447\u2013451. IEEE (2012)","DOI":"10.1109\/CIS.2012.106"},{"issue":"11","key":"3_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"3_CR12","unstructured":"Seward, J., Nethercote, N., Fitzhardinge, J.: Valgrind, an open-source memory debugger for x86-gnu\/linux (2004). http:\/\/www.ukuug.org\/events\/linux2002\/papers\/html\/valgrind"}],"container-title":["Internet of Things","Security and Fault Tolerance in Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02807-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T12:30:30Z","timestamp":1775305830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02807-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"ISBN":["9783030028060","9783030028077"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02807-7_3","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"value":"2199-1073","type":"print"},{"value":"2199-1081","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,14]]}}}