Dickson polynomial-based secure group authentication scheme for Internet of Things

被引:1
|
作者
Syed, Salman Ali [1 ]
Manickam, Selvakumar [2 ]
Uddin, Mueen [3 ]
Alsufyani, Hamed [4 ]
Shorfuzzaman, Mohammad [5 ]
Selvarajan, Shitharth [6 ,7 ]
Mohammed, Gouse Baig [8 ]
机构
[1] Jouf Univ, Dept Comp Sci, Sakaka, Al Jouf, Saudi Arabia
[2] Univ Sains Malaysia, Natl Adv Ctr IPv6 NAv6, Gelugor 11800, Penang, Malaysia
[3] Univ Doha Sci & Technol, Coll Comp & IT, Doha 24449, Qatar
[4] Saudi Elect Univ, Coll Comp & Informat, Dept Comp Sci, Riyadh 11673, Saudi Arabia
[5] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, Taif 21944, Saudi Arabia
[6] Leeds Beckett Univ, Sch Built Environm Engn & Comp, Leeds LS1 3HE, England
[7] Kebri Dehar Univ, Dept Comp Sci & Engn, Kebri Dehar 250, Ethiopia
[8] Vardhaman Coll Engn, Dept Comp Sci & Engn, Hyderabad, India
关键词
Conditional privacy preservation; Certificate-less; Group authentication scheme; Internet of Things; Dickson polynomial; Blockchain technology; LIGHTWEIGHT GROUP AUTHENTICATION;
D O I
10.1038/s41598-024-55044-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. In order to facilitate this, a secure group authentication scheme that creates trust amongst a group of IoT devices owned by several entities has been proposed. The majority of proposed authentication techniques are made for individual device authentication and are also utilized for group authentication; nevertheless, a unique solution for group authentication is the Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed authentication technique are generated using the Dickson polynomial, which enables the group to authenticate without generating an excessive amount of network traffic overhead. IoT devices' group authentication has made use of the Dickson polynomial. Blockchain technology is employed to enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed at different places. Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this, we have implemented a hardware-based physically unclonable function. Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli's Testnet framework. Performance analysis has been carried out by choosing various benchmarks and found that the proposed framework outperforms its counterparts through various metrics. Different parameters are also utilized to assess the performance of the proposed blockchain framework and shows that it has better performance in terms of computation, communication, storage and latency.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Dickson polynomial-based secure group authentication scheme for Internet of Things
    Salman Ali Syed
    Selvakumar Manickam
    Mueen Uddin
    Hamed Alsufyani
    Mohammad Shorfuzzaman
    Shitharth Selvarajan
    Gouse Baig Mohammed
    [J]. Scientific Reports, 14
  • [2] Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network
    Singh, Raman
    Sturley, Sean
    Tewari, Hitesh
    [J]. FUTURE INTERNET, 2023, 15 (03):
  • [3] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [4] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [5] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    [J]. PeerJ Computer Science, 2023, 9
  • [6] Cryptanalysis of a polynomial-based key management scheme for secure group communication
    [J]. Kamal, A.A. (a_kamala@ece.concordia.ca), 1600, Femto Technique Co., Ltd. (15):
  • [7] Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
    Truong, Toan-Thinh
    Tran, Minh-Triet
    Duong, Anh-Duc
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [8] A Novel Secure Authentication Scheme for Heterogeneous Internet of Things
    Liu, Jingwei
    Ren, Ailian
    Zhang, Lihuan
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [9] Secure and anonymous authentication scheme for the Internet of Things with pairing
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. Pervasive and Mobile Computing, 2020, 67
  • [10] DTLS based secure group communication scheme for Internet of Things
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 156 - 164