%% You should probably cite draft-tschofenig-ace-group-communication-security instead of this I-D. @techreport{somaraju-ace-multicast-02, number = {draft-somaraju-ace-multicast-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-somaraju-ace-multicast/02/}, author = {Abhinav Somaraju and Sandeep S. Kumar and Hannes Tschofenig and Walter Werner}, title = {{Security for Low-Latency Group Communication}}, pagetotal = 27, year = 2016, month = oct, day = 31, abstract = {Some Internet of Things application domains require secure group communication. This draft describes procedures for authorization, key management, and securing group messages. We specify the usage of object security at the application layer for group communication and assume that CoAP is used as the application layer protocol. The architecture allows the usage of symmetric and asymmetric keys to secure the group messages. The asymmetric key solution provides the ability to uniquely authenticate the source of all group messages and this is the recommended architecture for most applications. However, some applications have strict requirements on latency for group communication (e.g. in non-emergency lighting applications) and it may not always be feasible to use the secure source authenticated architecture. In such applications we recommend the use of dynamically generated symmetric group keys to secure group communications.}, }