Dickson polynomial-based secure group authentication scheme for Internet of Things

被引:0
|
作者
Salman Ali Syed
Selvakumar Manickam
Mueen Uddin
Hamed Alsufyani
Mohammad Shorfuzzaman
Shitharth Selvarajan
Gouse Baig Mohammed
机构
[1] Jouf University,Department of Computer Science, Applied College Tabarjal
[2] Universiti Sains Malaysia,National Advanced IPv6 Centre (NAv6)
[3] University of Doha for Science and Technology,College of Computing and IT
[4] Saudi Electronic University,Department of Computer Science, College of Computing and Informatics
[5] Taif University,Department of Computer Science, College of Computers and Information Technology
[6] Leeds Beckett University,School of Built Environment, Engineering and Computing
[7] Kebri Dehar University,Department of Computer Science and Engineering
[8] Vardhaman College of Engineering,Department of Computer Science and Engineering
来源
关键词
Conditional privacy preservation; Certificate-less; Group authentication scheme; Internet of Things; Dickson polynomial; Blockchain technology;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. In order to facilitate this, a secure group authentication scheme that creates trust amongst a group of IoT devices owned by several entities has been proposed. The majority of proposed authentication techniques are made for individual device authentication and are also utilized for group authentication; nevertheless, a unique solution for group authentication is the Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed authentication technique are generated using the Dickson polynomial, which enables the group to authenticate without generating an excessive amount of network traffic overhead. IoT devices' group authentication has made use of the Dickson polynomial. Blockchain technology is employed to enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed at different places. Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this, we have implemented a hardware-based physically unclonable function. Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli’s Testnet framework. Performance analysis has been carried out by choosing various benchmarks and found that the proposed framework outperforms its counterparts through various metrics. Different parameters are also utilized to assess the performance of the proposed blockchain framework and shows that it has better performance in terms of computation, communication, storage and latency.
引用
收藏
相关论文
共 50 条
  • [1] Dickson polynomial-based secure group authentication scheme for Internet of Things
    Syed, Salman Ali
    Manickam, Selvakumar
    Uddin, Mueen
    Alsufyani, Hamed
    Shorfuzzaman, Mohammad
    Selvarajan, Shitharth
    Mohammed, Gouse Baig
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [2] Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network
    Singh, Raman
    Sturley, Sean
    Tewari, Hitesh
    [J]. FUTURE INTERNET, 2023, 15 (03):
  • [3] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [4] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [5] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    [J]. PeerJ Computer Science, 2023, 9
  • [6] Cryptanalysis of a polynomial-based key management scheme for secure group communication
    [J]. Kamal, A.A. (a_kamala@ece.concordia.ca), 1600, Femto Technique Co., Ltd. (15):
  • [7] Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
    Truong, Toan-Thinh
    Tran, Minh-Triet
    Duong, Anh-Duc
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [8] A Novel Secure Authentication Scheme for Heterogeneous Internet of Things
    Liu, Jingwei
    Ren, Ailian
    Zhang, Lihuan
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [9] Secure and anonymous authentication scheme for the Internet of Things with pairing
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. Pervasive and Mobile Computing, 2020, 67
  • [10] DTLS based secure group communication scheme for Internet of Things
    Choudhury, Bikramjit
    Nag, Amitava
    Nandi, Sukumar
    [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 156 - 164