Authentication in dynamic groups using identity-based signatures

被引:0
|
作者
Felde, Nils Gentschen [1 ]
Grundner-Culemann, Sophia [1 ]
Guggemos, Tobias [1 ]
机构
[1] Ludwig Maximilians Univ Munchen, MNM Team, Munich, Germany
关键词
IoT; Multicast; Security; Group Communication; Authentication; Identity-Based Signatures; EFFICIENT; SECURE;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Group communication in constrained networks lately sparked broader interest as it allows dealing more efficiently with the few available resources. Both sender authentication and membership verification are serious issues to be tackled despite the lack of resources. Identity-based signatures (IBS) offer an alternative to certificate-based authentication by mathematically binding a user's public key to its identity. To utilize the consequently smaller network load, this paper proposes an IBS-based lightweight solution to achieve authentication and membership verification for group communication in constrained environments. An infrastructure for managing IBS based authentication is introduced together with a taxonomy for the selection of suitable IBS schemes. An implementation and practical evaluation on basis of an IoT-lab completes this, demonstrating that IBS is a viable option for very constrained devices. To the best of our knowledge, this is the first fully operational implementation and proof of applicability of IBS in such a scenario.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
    Sood, Sandeep K.
    INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 67 - 77
  • [2] An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation
    Yasmin, Rehana
    Ritter, Eike
    Wang, Guilin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 126 - 133
  • [3] Identity-based signatures
    Kiltz, Eike
    Neven, Gregory
    Cryptology and Information Security Series, 2009, 2 : 31 - 44
  • [4] Versatile identity-based signatures for authentication in multi-user settings
    Sun, Xi
    Jiang, ZhengTao
    Zhou, MeiRong
    Wang, Yumin
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (03) : 156 - 164
  • [5] Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures
    Suganthi, S. D.
    Anitha, R.
    Thanalakshmi, P.
    DIGITAL CONNECTIVITY - SOCIAL IMPACT, 2016, 679 : 155 - 168
  • [6] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [7] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [8] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [9] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [10] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566