Bormann, C., Ersue, M., Kernen, A., and Gomez, C.
(2017). Terminology for Constrained-Node Net-
works. Internet-Draft draft-bormann-lwig-7228bis-
02, Internet Engineering Task Force. Work in Pro-
gress.
Djamaa, B., Richardson, M., Aouf, N., and Walters, B.
(2014). Unicast/multicast performance in single-hop
duty-cycled 6LoWPAN networks. In 9th Internatio-
nal Symposium on Communication Systems, Networks
& Digital Signal Processing (CSNDSP), 2014, pages
140–145, Piscataway, NJ. IEEE.
Farrell, S. (2018). Low-Power Wide Area Network (LP-
WAN) Overview. RFC 8376.
gentschen Felde, N., Guggemos, T., Heider, T., and Kran-
zlm
¨
uller, D. (2017). Secure group key distribution in
constrained environments with ikev2: (under review).
In 2017 IEEE Conference on Dependable and Secure
Computing, Taipei, Taiwan. IEEE.
Guggemos, T., Felde, N. g., and Kranzlm
¨
uller, D. (2017).
Secure Group Communication in Constrained Net-
works - A Gap Analysis. In The 1st 2017 GLOBAL IoT
SUMMIT (GIoTS’17), Geneva, Switzerland. IEEE.
Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S.,
and Ott, J. (2017). Security and privacy in device-
to-device (d2d) communication: A review.
Kushalnagar, N., Montenegro, G., and Schumacher, C.
(2007). Ipv6 over low-power wireless personal area
networks (6lowpans): Overview, assumptions, pro-
blem statement, and goals. RFC4919.
Migault, D., Guggemos, T., Killian, S., Laurent, M., Pu-
jolle, G., and Wary, J. P. (2017). Diet-ESP: IP layer
security for IoT.
Migault, D., Palomares, D., Guggemos, T., Wally, A., Lau-
rent, M., and Wary, J. P. (2015). Recommendations
for IPsec Configuration on Homenet and M2M De-
vices. In Proceedings of the 11th ACM Symposium
on QoS and Security for Wireless and Mobile Net-
works, Q2SWinet ’15, pages 9–17, New York, NY,
USA. ACM.
Omara, E., benjamin.beurdouche@inria.fr, Rescorla, E., In-
guva, S., Kwon, A., and Duric, A. (2018). Messa-
ging Layer Security Architecture. Internet-Draft draft-
omara-mls-architecture-01, Internet Engineering Task
Force. Work in Progress.
Rafaeli, S. and Hutchison, D. (2003). A survey of key ma-
nagement for secure group communication.
Shang, W., Wang, Z., Afanasyev, A., Burke, J., and Zhang,
L. (2017). Breaking out of the cloud. In IEEE/ACM,
editor, 2017 IEEE/ACM Second International Confe-
rence on Internet-of-Things Design and Implementa-
tion, pages 3–13, Piscataway, NJ. IEEE.
Shor, P. W. (1994). Algorithms for quantum computa-
tion: Discrete logarithms and factoring. In Goldwas-
ser, S., editor, Foundations of Computer Science, 35th
Symposium on (FOCS ’94, pages 124–134, [Place of
publication not identified]. IEEE Computer Society
Press.
Silva, R., Silva, J. S., Simek, M., and Boavida, F. (2008).
Why should multicast be used in WSNs. In Qu,
G., editor, IEEE International Symposium on Wireless
Communication Systems 2008, pages 598–602, Pisca-
taway, NJ. IEEE.
Singh, M., Rajan, M. A., Shivraj, V. L., and Balamura-
lidhar, P. (2015). Secure mqtt for internet of things
(iot). In Tomar, G. S., editor, 2015 Fifth International
Conference on Communication Systems and Network
Technologies (CSNT), pages 746–751, Piscataway, NJ
and Piscataway, NJ. IEEE.
Sun, Y., Gurewitz, O., and Johnson, D. B. (2008). RI-
MAC: a receiver-initiated asynchronous duty cycle
MAC protocol for dynamic traffic loads in wireless
sensor networks. In Abdelzaher, T., Martonosi, M.,
and Wolisz, A., editors, SenSys ’08, page 1, New York
(NY). A.C.M.
Tiloca, M., Nikitin, K., and Raza, S. (2017). Axiom.
Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey
on trust management for Internet of Things.
Dynamic Key Distribution for Secure Group Communications in Constrained Environments
21