Secure Multicast Communication Techniques for IoT

  • Subho Shankar BasuEmail author
  • Somanath Tripathy
Part of the Internet of Things book series (ITTCC)


With the advent of Internet of Things (IoT) and the wide number of applications that it is being applied on, eventually it will surpass the present size of the Internet. But with these number of devices serving so many applications and being reachable remotely over the Internet, they become equally prone towards attacks and vulnerabilities. Hence, efficient and secure mechanisms tailored to such portable devices are to be designed. Most importantly the protocols running on these devices need to satisfy the basic security requirements while consuming minimum resources in terms of memory, bandwidth and power. Also as these devices will be in millions there is an increasing need to design multicast security mechanisms as many of the applications require it. Till date there has been limited contribution towards multicast security with approaches made mainly based on extending the DTLS protocol, which certainly has a number of drawbacks. In this chapter, we discuss major requirements of secure group communication and present different secure multicast communication techniques emphasizing an interesting and effective approach called S-CPABE.


  1. 1.
    Sakarindr, P., Ansari, N.: Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wirel. Commun. 14(5) (2007)CrossRefGoogle Scholar
  2. 2.
    Basu, S.S., Tripathy, S.: Securing multicast group communication in IoT enabled systems. IETE Tech. Rev. (2018) (accepted)Google Scholar
  3. 3.
    DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., Towsley, D., Vasudevan, S., Zhang, C.: Secure group communications for wireless networks. In: Military Communications Conference, MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 113–117. IEEE (2001)Google Scholar
  4. 4.
    Sun, Y., Trappe, W., Liu, K.R.: A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Trans. Netw. 12(4), 653–666 (2004)CrossRefGoogle Scholar
  5. 5.
    Gupta, S.K., Cherukuri, S.: An adaptive protocol for efficient and secure multicasting in IEEE 802.11 based wireless lans. In: Wireless Communications and Networking, WCNC 2003, vol. 3, pp. 2021–2026. IEEE (2003)Google Scholar
  6. 6.
    Westerhoff, L., Reinhardt, S., Schafer, G., Wolisz, A.: Security analysis and concept for the multicast-based handover support architecture Mombasa. In: Global Telecommunications Conference, GLOBECOM’04, vol. 4, pp. 2201–2207. IEEE (2004)Google Scholar
  7. 7.
    Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503–1511 (2015)CrossRefGoogle Scholar
  8. 8.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in CryptologyCRYPTO 2001, pp. 213–229. Springer (2001)Google Scholar
  9. 9.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP’07, California, USA, pp. 321–334. IEEE (2007)Google Scholar
  10. 10.
    Wang, C.-J., Luo, J.-F.: A key-policy attribute-based encryption scheme with constant size ciphertext. In: 2012 Eighth International Conference on Computational Intelligence and Security (CIS), Guangzhou, China, pp. 447–451. IEEE (2012)Google Scholar
  11. 11.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Seward, J., Nethercote, N., Fitzhardinge, J.: Valgrind, an open-source memory debugger for x86-gnu/linux (2004).

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.IIT PatnaPatnaIndia

Personalised recommendations