{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:40:55Z","timestamp":1725975655325},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_22","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"320-338","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups"],"prefix":"10.1007","author":[{"given":"Mohammed Riyadh","family":"Abdmeziem","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois","family":"Charoy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"22_CR1","unstructured":"The Contiki Operating System. http:\/\/www.contiki-os.org"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.compeleceng.2015.03.030","volume":"44","author":"MR Abdmeziem","year":"2015","unstructured":"Abdmeziem, M.R., Tandjaoui, D.: An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44, 184\u2013197 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: A decentralized batch-based group key management protocol for mobile internet of things (DBGK). In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 1109\u20131117. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.166"},{"key":"22_CR4","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-22168-7_3","volume-title":"Robots and Sensor Clouds","author":"MR Abdmeziem","year":"2016","unstructured":"Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: Architecting the internet of things: state of the art. In: Koubaa, A., Shakshuki, E. (eds.) Robots and Sensor Clouds. SSDC, vol. 36, pp. 55\u201375. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-22168-7_3"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: A new distributed MIKEY mode to secure e-health applications. In: Proceedings of the International Conference on Internet of Things and Big Data, IoTBD, vol. 1, pp. 88\u201395. SciTePress (2016)","DOI":"10.5220\/0005945300880095"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: Lightweighted and energy-aware MIKEY-ticket for e-health applications in the context of internet of things. Int. J. Sens. Netw. (2017, in press)","DOI":"10.1504\/IJSNET.2018.10011717"},{"key":"22_CR7","unstructured":"Balenson, D., McGrew, D., Sherman, A.: Key management for large dynamic groups: one-way function trees and amortized initialization. Internet-Draft, February 1999"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Ballardie, A.: Scalable multicast key distribution. RFC 1949, May 1996","DOI":"10.17487\/rfc1949"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-46703-8_19","volume-title":"Networked Group Communication","author":"B Briscoe","year":"1999","unstructured":"Briscoe, B.: MARKS: zero side effect multicast key management using arbitrarily revealed key sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 301\u2013320. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/978-3-540-46703-8_19"},{"issue":"1","key":"22_CR10","first-page":"105","volume":"2","author":"Y Challal","year":"2005","unstructured":"Challal, Y., Seba, H.: Group key management protocols: a novel taxonomy. Int. J. Inf. Technol. 2(1), 105\u2013118 (2005)","journal-title":"Int. J. Inf. Technol."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2014.11.001","volume":"50","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Kiah, M., Shamshirband, S., Rehman, M.: Toward secure group communication in wireless mobile environments: issues, solutions, and challenges. J. Netw. Comput. Appl. 50, 1\u201314 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"22_CR12","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/S1570-8705(03)00046-5","volume":"1","author":"R Pietro Di","year":"2003","unstructured":"Di Pietro, R., Mancini, L.V., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Netw. 1(4), 455\u2013468 (2003)","journal-title":"Ad Hoc Netw."},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.compeleceng.2014.02.008","volume":"41","author":"G Dini","year":"2015","unstructured":"Dini, G., Lopriore, L.: Key propagation in wireless sensor networks. Comput. Electr. Eng. 41, 426\u2013433 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"22_CR14","unstructured":"Dunkels, A., Eriksson, J., Finne, N., Tsiftes, N.: Powertrace: network-level power profiling for low-power wireless networks (2011)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) architecture. RFC 2093, July 1997","DOI":"10.17487\/rfc2094"},{"issue":"1","key":"22_CR16","first-page":"68","volume":"15","author":"AA Kamal","year":"2013","unstructured":"Kamal, A.A.: Cryptanalysis of a polynomial-based key management scheme for secure group communication. IJ Netw. Secur. 15(1), 68\u201370 (2013)","journal-title":"IJ Netw. Secur."},{"issue":"3","key":"22_CR17","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","volume":"1","author":"SL Keoh","year":"2014","unstructured":"Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265\u2013275 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(1), 60\u201396 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/TNET.2006.872575","volume":"14","author":"P Lee","year":"2006","unstructured":"Lee, P., Lui, J., Yau, D.: Distributed collaborative key agreement and authentication protocols for dynamic peer groups. IEEE\/ACM Trans. Netw. 14(2), 263\u2013276 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-46781-8","volume-title":"Security for Wireless Sensor Networks","author":"D Liu","year":"2007","unstructured":"Liu, D., Ning, P.: Security for Wireless Sensor Networks, vol. 28. Springer Science & Business Media, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-46781-8"},{"key":"22_CR21","unstructured":"Liu, N., Tang, S., Xu, L.: Attacks and comments on several recently proposed key management schemes. IACR Cryptology ePrint Archive 2013:100 (2013)"},{"issue":"4","key":"22_CR22","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/263109.263179","volume":"27","author":"S Mittra","year":"1997","unstructured":"Mittra, S.: Iolus: a framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 277\u2013288 (1997)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Oster, G., Urso, P., Molli, P., Imine, A.: Data consistency for P2P collaborative editing. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, pp. 259\u2013268. ACM (2006)","DOI":"10.1145\/1180875.1180916"},{"key":"22_CR24","unstructured":"Patsakis, C., Solanas, A.: An efficient scheme for centralized group key management in collaborative environments. IACR Cryptology ePrint Archive 2013:489 (2013)"},{"issue":"9","key":"22_CR25","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.camwa.2012.02.008","volume":"65","author":"Y Piao","year":"2013","unstructured":"Piao, Y., Kim, J., Tariq, U., Hong, M.: Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300\u20131309 (2013)","journal-title":"Comput. Math. Appl."},{"issue":"1\u20132","key":"22_CR26","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0304-3975(84)90130-0","volume":"31","author":"DA Plaisted","year":"1984","unstructured":"Plaisted, D.A.: New NP-hard and NP-complete polynomial and integer divisibility problems. Theor. Comput. Sci. 31(1\u20132), 125\u2013138 (1984)","journal-title":"Theor. Comput. Sci."},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Rafaeli, S., Hutchison, D.: Hydra: a decentralized group key management. In: 11th IEEE International WETICE: Enterprise Security Workshop, June 2002","DOI":"10.1109\/ENABL.2002.1029990"},{"issue":"3","key":"22_CR28","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. (CSUR) 35(3), 309\u2013329 (2003)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: a scalable group re-keying approach for secure multicast. In: Proceedings IEEE Symposium on Security and Privacy, pp. 215\u2013228 (2000)","DOI":"10.1109\/SECPRI.2000.848459"},{"issue":"11","key":"22_CR30","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Internet of things: security in the keys. In: Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 129\u2013133. ACM (2016)","DOI":"10.1145\/2988272.2988280"},{"issue":"2","key":"22_CR33","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1197\/jamia.M2025","volume":"13","author":"PC Tang","year":"2006","unstructured":"Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., Sands, D.Z.: Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J. Am. Med. Inform. Assoc. 13(2), 121\u2013126 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"8","key":"22_CR34","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1016\/j.adhoc.2013.05.009","volume":"11","author":"L Veltri","year":"2013","unstructured":"Veltri, L., Cirani, S., Busanelli, S., Ferrari, G.: A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw. 11(8), 2724\u20132737 (2013)","journal-title":"Ad Hoc Netw."},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Wang, W., Bhargava, B.: Key distribution and update for secure inter-group multicast communication. In: Proceedings of the 3rd ACM Workshop on Security of ad Hoc and Sensor Networks, pp. 43\u201352. ACM (2005)","DOI":"10.1145\/1102219.1102227"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Wang, W., Wang, Y.: Secure group-based information sharing in mobile ad hoc networks. In: IEEE International Conference on Communications, ICC 2008, pp. 1695\u20131699. IEEE (2008)","DOI":"10.1109\/ICC.2008.327"},{"issue":"1","key":"22_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C Wong","year":"2000","unstructured":"Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE\/ACM Trans. Netw. 8(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T22:47:20Z","timestamp":1571266040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}