A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …

A lightweight group key management scheme with constant rekeying cost and public bulletin size

P Sharma, P BR - Information Security Journal: A Global …, 2024 - Taylor & Francis
Several group key management schemes have focused either on meeting security goals or
efficiency. However, only a few works exist that address the issue of handling offline users …

Securing polynomial based group key management scheme against strong active adversary model

P Sharma, BR Purushothama - International Journal of Information …, 2022 - Springer
The literature on group key management focuses solely on the security of schemes under
passive adversary model. But they lack security against a more realistic adversary known as …

Proving the (In) Security of CRT Based Key Management Schemes Under SAOA Model

P Sharma, BR Purushothama - Wireless Personal Communications, 2024 - Springer
There have been several proposed methods in the literature for securely distributing group
keys and managing group dynamics for secure group communications. While these …

AdaPtive and rObust Key pre‐distribution for multi‐phase IoT networks

ML Messai - International Journal of Communication Systems, 2024 - Wiley Online Library
Summary Internet of Things (IoT) networks continue to be deployed and play a crucial role in
our daily life. Thus, ensuring their security is of utmost importance. This necessitates the use …

BKRSC-IoT: Blockchain-Based Key Revocation Using Smart Contracts for IoT Networks

S Bettayeb, ML Messai, SM Hemam - International Conference on …, 2023 - Springer
The growth of Internet of Things (IoT) networks has brought the crucial need for information
and communication security to the fore. Since IoT devices exchange sensitive data, secure …

Why Traditional Group Key Management Schemes Don't Scale in Multi-group Settings?

P Sharma, BR Purushothama - … Conference on Frontiers in Computing and …, 2022 - Springer
The traditional key management schemes focus on single-group settings. The design
principles focus on reducing the rekeying, storage, and computation costs and satisfying …

A Smart Contract-based Blockchain Solution for Key Revocation in IoT Networks

S Bettayeb, ML Messai, SM Hemam - 2024 - researchsquare.com
The emergence and growing use of advanced technologies have opened up new
possibilities for addressing the security challenges of resource-constrained IoT networks. As …