Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/6294
Full metadata record
DC FieldValueLanguage
dc.contributor.authorŞahin, Serap-
dc.contributor.authorAslanoğlu, Rabia-
dc.date.accessioned2017-10-02T13:55:22Z
dc.date.available2017-10-02T13:55:22Z
dc.date.issued2017
dc.identifier.citationŞahin, S., and Aslanoğlu, R. (2017). Comparison of group key establishment protocols. Turkish Journal of Electrical Engineering and Computer Sciences, 25(1), 46-57. doi:10.3906/elk-1407-213en_US
dc.identifier.issn1300-0632
dc.identifier.issn1300-0632-
dc.identifier.issn1303-6203-
dc.identifier.urihttp://doi.org/10.3906/elk-1407-213-
dc.identifier.urihttp://hdl.handle.net/11147/6294-
dc.identifier.urihttps://search.trdizin.gov.tr/yayin/detay/248205-
dc.description.abstractRecently group-oriented applications over unsecure open networks such as Internet or wireless networks have become very popular. Thus, group communication security over unsecure open networks has become a vital concern. Group key establishment (GKE) protocols are used to satisfy the confidentiality requirement of a newly started communication session by the generation or sharing of an ephemeral common key between the group members. In this study, we analyze the computation and communication efficiency of GKE protocols. Besides confidentiality, the security characteristics of identification and integrity control are also required for all steps of the protocol implementations. Thus, the main contribution of this work is to provide the computation and communication efficiency analysis of the same GKE protocols along with the identification of the group entities and integrity control of messages during the protocol steps. The specific implementation and analysis of GKE protocols are performed by group key agreement (GKA) with pairing- based cryptography and group key distribution (GKD) with verifiable secret sharing, respectively. Finally, a comparison of GKA and GKD protocols on the basis of their strong points and cost characteristics are also provided to inform potential users.en_US
dc.language.isoenen_US
dc.publisherTürkiye Klinikleri Journal of Medical Sciencesen_US
dc.relation.ispartofTurkish Journal of Electrical Engineering and Computer Sciencesen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectGroup key establishmenten_US
dc.subjectSecure communicationsen_US
dc.subjectVerifiable secret sharingen_US
dc.subjectNetwork securityen_US
dc.titleComparison of group key establishment protocolsen_US
dc.typeArticleen_US
dc.authoridTR115373en_US
dc.institutionauthorŞahin, Serap-
dc.institutionauthorAslanoğlu, Rabia-
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.volume25en_US
dc.identifier.issue1en_US
dc.identifier.startpage46en_US
dc.identifier.endpage57en_US
dc.identifier.wosWOS:000396569100004en_US
dc.identifier.scopus2-s2.0-85010822041en_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.3906/elk-1407-213-
dc.relation.doi10.3906/elk-1407-213en_US
dc.coverage.doi10.3906/elk-1407-213en_US
dc.identifier.trdizinid248205en_US
dc.identifier.wosqualityQ4-
dc.identifier.scopusqualityQ3-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.languageiso639-1en-
item.fulltextWith Fulltext-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
TR Dizin İndeksli Yayınlar / TR Dizin Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
6294.pdfMakale2.08 MBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

Page view(s)

5,708
checked on Apr 22, 2024

Download(s)

146
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.