{"id":"https://openalex.org/W4399666390","doi":"https://doi.org/10.1109/tifs.2024.3414663","title":"Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members","display_name":"Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4399666390","doi":"https://doi.org/10.1109/tifs.2024.3414663"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3414663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3414663","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041466157","display_name":"Julio C\u00e9sar P\u00e9rez Garc\u00eda","orcid":"https://orcid.org/0000-0002-9288-9040"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I4390039363","display_name":"Infection et inflammation","ror":"https://ror.org/021sh3243","country_code":"FR","type":"facility","lineage":["https://openalex.org/I154526488","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4390039363"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Julio C. P\u00e9rez-Garc\u00eda","raw_affiliation_strings":["Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I4390039363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011861898","display_name":"An Braeken","orcid":"https://orcid.org/0000-0002-9965-915X"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"An Braeken","raw_affiliation_strings":["Department of Engineering Technology (INDI), Vrije Universiteit Brussel, Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Technology (INDI), Vrije Universiteit Brussel, Brussels, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I4390039363","display_name":"Infection et inflammation","ror":"https://ror.org/021sh3243","country_code":"FR","type":"facility","lineage":["https://openalex.org/I154526488","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4390039363"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I4390039363"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041466157"],"corresponding_institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I4390039363"],"apc_list":null,"apc_paid":null,"fwci":5.5391,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96248152,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"6709","last_page":"6721"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7135000228881836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7135000228881836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13693","display_name":"Smart Systems and Machine Learning","score":0.636900007724762,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13748","display_name":"Advanced Statistical Modeling Techniques","score":0.5964000225067139,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8082146048545837},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7840401530265808},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6746464967727661},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.6499112844467163},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.6367045640945435},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5828855037689209},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5604725480079651},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.5514772534370422},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.5512076020240784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5395023822784424},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5298903584480286},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3844509720802307},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38353532552719116},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3291640877723694},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10870522260665894},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07592436671257019}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8082146048545837},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7840401530265808},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6746464967727661},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.6499112844467163},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.6367045640945435},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5828855037689209},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5604725480079651},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.5514772534370422},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.5512076020240784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5395023822784424},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5298903584480286},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3844509720802307},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38353532552719116},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3291640877723694},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10870522260665894},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07592436671257019},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2024.3414663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3414663","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:178405","is_oa":false,"landing_page_url":"https://biblio.vub.ac.be/vubir/blockchainbased-group-key-management-scheme-for-iot-with-anonymity-of-group-members(a3ec1261-f8eb-43e4-a1ee-16133dce2f58).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:215107","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320366","display_name":"European Cooperation in Science and Technology","ror":"https://ror.org/01bstzn19"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2116385997","https://openalex.org/W2493306725","https://openalex.org/W2544274814","https://openalex.org/W2554409698","https://openalex.org/W2791518958","https://openalex.org/W2920960013","https://openalex.org/W2926987861","https://openalex.org/W2949726555","https://openalex.org/W2949964142","https://openalex.org/W2955886508","https://openalex.org/W2968774960","https://openalex.org/W2969954377","https://openalex.org/W2976695157","https://openalex.org/W3031787259","https://openalex.org/W3080994326","https://openalex.org/W3093848279","https://openalex.org/W3097857975","https://openalex.org/W3098532907","https://openalex.org/W3120215141","https://openalex.org/W3127981346","https://openalex.org/W3130714525","https://openalex.org/W3131306635","https://openalex.org/W3178457697","https://openalex.org/W3192407459","https://openalex.org/W3208178655","https://openalex.org/W3209026375","https://openalex.org/W4200473885","https://openalex.org/W4205426993","https://openalex.org/W4221102702","https://openalex.org/W4225243780","https://openalex.org/W4225851476","https://openalex.org/W4226020743","https://openalex.org/W4293195563","https://openalex.org/W4312490524","https://openalex.org/W4313534838","https://openalex.org/W4379260999","https://openalex.org/W6759973471","https://openalex.org/W6846227106"],"related_works":["https://openalex.org/W1969405252","https://openalex.org/W1588782201","https://openalex.org/W2737741652","https://openalex.org/W2157806538","https://openalex.org/W2312561444","https://openalex.org/W35292217","https://openalex.org/W2040325382","https://openalex.org/W2102798856","https://openalex.org/W1803519505","https://openalex.org/W3020310102"],"abstract_inverted_index":{"Group":[0],"communications":[1,36,67],"play":[2],"a":[3,60,128,156],"crucial":[4],"role":[5],"in":[6,33,73,166,169],"enhancing":[7],"the":[8,38,50,107,113,135,138,167],"quality":[9],"of":[10,13,15,40,53,112,118,137,146,171],"service":[11],"(QoS)":[12],"Internet":[14],"Things":[16],"(IoT)":[17],"networks,":[18],"enabling":[19],"efficient":[20,42],"information":[21,29],"dissemination":[22],"while":[23,103],"minimizing":[24],"resource":[25],"utilization.":[26],"However,":[27],"ensuring":[28],"security":[30],"and":[31,43,100,122,148,173],"privacy":[32],"IoT":[34,55,74],"group":[35,66,92,101,119,157],"necessitates":[37],"implementation":[39],"an":[41,87],"lightweight":[44],"key":[45,62,89,124,158],"management":[46,63],"scheme":[47,78],"due":[48],"to":[49,82,154],"limited":[51],"capabilities":[52],"most":[54],"devices.":[56],"This":[57],"paper":[58],"presents":[59],"novel":[61],"protocol":[64,114],"for":[65],"that":[68],"employs":[69],"distributed":[70],"Blockchain":[71],"technology":[72],"networks.":[75],"The":[76],"proposed":[77,139],"considers":[79],"nodes":[80],"belonging":[81],"multiple":[83],"groups.":[84],"By":[85],"utilizing":[86],"asymmetric":[88],"shared":[90],"among":[91,159],"members,":[93],"secure":[94],"communication":[95,174],"is":[96,115],"established":[97],"between":[98],"outsiders":[99],"members":[102],"preserving":[104],"anonymity":[105,121],"inside":[106],"group.":[108],"A":[109],"distinguishing":[110],"feature":[111],"its":[116],"combination":[117],"member":[120],"automatic":[123],"revocation":[125],"facilitated":[126],"by":[127],"Smart":[129],"Contract.":[130],"Furthermore,":[131],"simulation":[132],"results":[133],"demonstrate":[134],"efficiency":[136],"scheme,":[140],"consuming":[141],"less":[142,150],"than":[143,151],"300":[144],"mJ":[145],"energy":[147],"taking":[149],"7":[152],"seconds":[153],"establish":[155],"1000":[160],"nodes,":[161],"outperforming":[162],"several":[163],"existing":[164],"approaches":[165],"literature":[168],"terms":[170],"computation":[172],"costs.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
