ABSTRACT
In IoT environments, the user may have many devices to connect each other and share the data. Also, the device will not have the powerful computation and storage ability. Many studies have focused on the lightweight authentication between the cloud server and the client in this environment. They can use the cloud server to help sensors or proxies to finish the authentication. But in the client side, how to create the group session key without the cloud capability is the most important issue in IoT environments. The most popular application network of IoT environments is the wireless body area network (WBAN). In WBAN, the proxy usually needs to control and monitor user's health data transmitted from the sensors. In this situation, the group authentication and group session key generation is needed. In this paper, in order to provide an efficient and robust group authentication and group session key generation in the client side of IoT environments, we propose a lightweight authentication scheme with dynamic group members in IoT environments. Our proposed scheme can satisfy the properties including the flexible generation of shared group keys, the dynamic participation, the active revocation, the low communication and computation cost, and no time synchronization problem. Also our scheme can achieve the security requirements including the mutual authentication, the group session key agreement, and prevent all various well-known attacks.
- C. Atkins, K. Koyanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H. Sawano. A cloud service for end-user participation concerning the internet of things. In 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pages 273--278, 2013. Google ScholarDigital Library
- J. Benaloh and M. d. Mare. One-way accumulators: A decentralized alternative to digital signatures. In EUROCRYPT '93, pages 274--285, 1993. Google ScholarDigital Library
- I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein. Trust in m2m communication. IEEE Vehicular Technology Magazine, 4:69--75, 2009.Google ScholarCross Ref
- K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl. Device-to-device communication as an underlay to lte-advanced networks. IEEE Communications Magazine, 47:42--49, 2009. Google ScholarDigital Library
- B. LatrÃl', B. Braem, I. Moerman, C. Blondia, and P. Demeester. A survey on wireless body area networks. Wireless Networks, 17:1--18, 2011. Google ScholarDigital Library
- J. Y. Lee, W. C. Lin, and Y. H. Huang. A lightweight authentication protocol for internet of things. In 2014 International Symposium on Next-Generation Electronics (ISNE), pages 1--2, 2014.Google ScholarCross Ref
- Z. Li, J. Higgins, and M. Clement. Performance of finite field arithmetic in an elliptic curve cryptosystem. In Ninth IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 249--256, 2001. Google ScholarDigital Library
- J. Liu, Y. Xiao, and C. P. Chen. Authentication and access control in the internet of things. In 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 588--592, 2012. Google ScholarDigital Library
- P. N. Mahalle, N. R. Prasad, and R. Prasad. Threshold cryptography-based group authentication (TCGA) scheme for the internet of things (IoT). In 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pages 1--5, 2014.Google ScholarCross Ref
- NIST FIPS PUB 180-2. Secure Hash Standard. National Institute of Standards and Technology, U. S. Department of Commerce DRAFT, 2004.Google Scholar
- NIST FIPS PUB 197. Announcing the ADVANCED ENCRYPTION STANDARD(AES). National Institute of Standards and Technology, U. S. Department of Commerce DRAFT, 2001.Google Scholar
- K. Nyberg. Fast accumulated hashing. In The Third International Workshop on Fast Software Encryption, 1996. Google ScholarDigital Library
- R. Rivest. The rc5 encryption algorithm. In 1st Workshop on Fast Software Encryption, pages 86--96, 1995.Google ScholarCross Ref
- M. Starsinic. System architecture challenges in the home m2m network. In Applications and Technology Conference (LISAT), pages 1--7, 2010.Google ScholarCross Ref
- K. Takashima. Scaling security of elliptic curves with fast pairing using efficient endomorphisms. IEICE Trans. on Fundamentals, E90-A:152--159, 2007. Google ScholarDigital Library
- X. Yao, X. Han, X. Du, and X. Zhou. A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sensors Journal, 13:3693--3701, 2013.Google ScholarCross Ref
- J. Yick, B. Mukherjee, and D. Ghosal. Wireless sensor network survey. Computer networks, 52:2292--2330, 2008. Google ScholarDigital Library
- G. Zhao, X. Si, J. Wang, X. Long, and T. Hu. A novel mutual authentication scheme for internet of things. In 2011 International Conference on Modelling, Identification and Control (ICMIC), pages 563--566, 2011.Google ScholarCross Ref
Recommendations
A two-factor security authentication scheme for wireless sensor networks in IoT environments
AbstractAs an important part of the Internet of Things, wireless sensor networks have been widely used in all aspects of people's lives. Identity authentication in wireless sensor networks guarantees security for users to safely access real-...
Design of a lightweight two-factor authentication scheme with smart card revocation
Smart card based authentication schemes present user-friendly and secure communication mechanism over insure public channel. Recently, Li et al. designed an authentication scheme with pre-smart card authentication to present efficient login phase and ...
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
AbstractThe Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe ...
Comments