{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:54:02Z","timestamp":1743018842293,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_12","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"213-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks"],"prefix":"10.1007","author":[{"given":"Pegah","family":"Nikbakht Bideh","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Samuel, S.S.: A review of connectivity challenges in IoT-smart home. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/ICBDSC.2016.7460395"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y., Kunz, T.: Performance evaluation of IoT protocols under a constrained wireless access network. In 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/MoWNet.2016.7496622"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Kim, J.Y., Hu, W., Shafagh, H., Jha, S.: Seda: secure over-the-air code dissemination protocol for the internet of things. IEEE Trans. Depend. Secur. Comput. 15(6), 1041\u20131054 (2016)","DOI":"10.1109\/TDSC.2016.2639503"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jnca.2015.10.011","volume":"61","author":"O Cheikhrouhou","year":"2016","unstructured":"Cheikhrouhou, O.: Secure group communication in wireless sensor networks: a survey. J. Netw. Comput. Appl. 61, 115\u2013132 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Dammak, M., Senouci, S.M., Messous, M.A., Elhdhili, M.H., Gransart, C.: Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans. Netw. Serv. Manag. 17(3), 1742\u20131757 (2020)","DOI":"10.1109\/TNSM.2020.3002957"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Piccoli, A., Pahl, M.O., W\u00fcstrich, L.: Group key management in constrained IoT settings. In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ISCC50000.2020.9219619"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Trans. Netw. 8(1), 16\u201330 (2000)","DOI":"10.1109\/90.836475"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Dini, G., Savino, I.M.: S2rp: a secure and scalable rekeying protocol for wireless sensor networks. In: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 457\u2013466. IEEE (2006)","DOI":"10.1109\/MOBHOC.2006.278586"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11277-008-9653-4","volume":"52","author":"J-H Son","year":"2010","unstructured":"Son, J.-H., Lee, J.-S., Seo, S.-W.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359\u2013382 (2010)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap+ efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"12_CR11","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The tesla broadcast authentication protocol. Rsa Cryptobytes 5(2), 2\u201313 (2002)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ferrari, N., Gebremichael, T., Jennehag, U., Gidlund, M.: Lightweight group-key establishment protocol for IoT devices: Implementation and performance analyses. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 31\u201337. IEEE (2018)","DOI":"10.1109\/IoTSMS.2018.8554829"},{"issue":"6","key":"12_CR13","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TC.2010.40","volume":"59","author":"L Harn","year":"2010","unstructured":"Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842\u2013846 (2010)","journal-title":"IEEE Trans. Comput."},{"issue":"11","key":"12_CR14","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1587\/transinf.E94.D.2069","volume":"94","author":"C-Y Lee","year":"2011","unstructured":"Lee, C.-Y., Wang, Z.-H., Harn, L., Chang, C.-C.: Secure key transfer protocol based on secret sharing for group communications. IEICE Trans Inf. Syst. 94(11), 2069\u20132076 (2011)","journal-title":"IEICE Trans Inf. Syst."},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1109\/ACCESS.2015.2474705","volume":"3","author":"P Porambage","year":"2015","unstructured":"Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for iot applications. IEEE Access 3, 1503\u20131511 (2015)","journal-title":"IEEE Access"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Sani, A.S., Yuan, D., Yeoh, P.L., Bao, W., Chen, S., Vucetic, B.: A lightweight security and privacy-enhancing key establishment for internet of things applications. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422725"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Fatemeh, K., Johnsen, E.B., Owe, O., Balasingham, I.: Group selection by nodes in wireless sensor networks using coalitional game theory. In 2011 16th IEEE International Conference on Engineering of Complex Computer Systems, pp. 253\u2013262. IEEE (2011)","DOI":"10.1109\/ICECCS.2011.32"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Behera, T.M., et al.: Residual energy-based cluster-head selection in WSNS for IoT application. IEEE Internet Things J. 6(3), 5132\u20135139 (2019)","DOI":"10.1109\/JIOT.2019.2897119"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Hamzeloei, F., Dermany, M.K.: A topsis based cluster head selection for wireless sensor network. Procedia Comput. Sci.98, 8\u201315 (2016)","DOI":"10.1016\/j.procs.2016.09.005"},{"key":"12_CR20","unstructured":"Bjoernsen, K.: Koblitz curves and its practical uses in bitcoin security. order ($$\\varepsilon $$ (GF (2k) 2(1), 7 (2009)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Raptis, T.P., Passarella, A., Conti, M.: Performance analysis of latency-aware data management in industrial IoT networks. Sensors 18(8), 2611 (2018)","DOI":"10.3390\/s18082611"},{"key":"12_CR22","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.:. Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from, pp. 05\u201316 (2018)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.:. On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, SFCS 2081, pp. 350\u2013357, Washington, DC, USA, 1981. IEEE Computer Society (1981)","DOI":"10.1109\/SFCS.1981.32"},{"key":"12_CR24","unstructured":"Ryan, M.D., Smyth, B.: Applied pi calculus. In: Formal Models and Techniques for Analyzing Security Protocols, pp. 112\u2013142. Ios Press (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T01:12:09Z","timestamp":1728436329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}