I. Background
Today's pervasive computing often involves a large number of mobile and dynamic IoT/EC devices. There are two essential aspects regarding the operation of such device groups. Firstly, IoT's pervasive connectivity, coupled with omnipresent data collection capability, introduces magnified security and privacy concerns. Secondly, IoT/EC security solutions need to take into consideration resource constraints as these devices (e.g. sensors) typically have only limited computation resources such as CPU, power, storage, and/or communication bandwidth. Resource intensive cryptographical solutions such as full-fledged Public Key Infrastructure (PKI) implementations are typically difficult to apply. This often leads to using symmetric key cryptography to efficiently secure IoT/EC group communication. Under such symmetric key schemes, a trusted managing node (e.g. key distribution center) constructs a communication group by first authenticating all member nodes using relatively expensive asymmetric key management (e.g., PKI based on 2048-bit RSA keys recommended by NIST) based credentials via encrypted tunnels (e.g., IPSEC). Upon successful authentications and authorizations, a sufficiently large symmetric key, e.g., a 256-bit AES key, is distributed to all members/nodes for use as the group communication key. Large symmetric keys are inherently secure in protecting group communication for data sharing. Additionally, a key rotation mechanism is often built-in to periodically and synchronously refresh the symmetric key across all IoT/EC members preventing eavesdropping and key cracking. As such, protocols employing large symmetric keys for group communication are secure and efficient.