Group Authentication and Key Establishment Scheme

被引:0
|
作者
Guzey, Sueda [1 ]
Kurt, Gunes Karabulut [2 ]
Ozdemir, Enver [1 ]
机构
[1] Istanbul Tech Univ, Inst Informat, TR-34330 Istanbul, Turkiye
[2] Polytech Montreal, Dept Elect Engn, Montreal, PQ H3C 3A7, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 21期
关键词
Authentication; Polynomials; Interpolation; Internet of Things; Costs; Elliptic curves; Galois fields; Elliptic curve cryptography; group authentication; inner product; secret-sharing schemes; vector spaces;
D O I
10.1109/JIOT.2024.3436652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group authentication is a technique that verifies the group membership of multiple users and establishes a shared secret key among them. Unlike the conventional authentication schemes that rely on a central authority to authenticate each user individually, group authentication can perform the authentication process simultaneously for all the members who participate. Group authentication has been found to be a suitable candidate for various applications in crowded in Internet of Things (IoT) environments, such as swarms of drones for agriculture, military, and surveillance, where a group of devices need to establish a secure authenticated communication channel among themselves. The recently presented group authentication algorithms mainly exploit Lagrange polynomial interpolation along with elliptic curve groups over finite fields. A polynomial interpolation-based group authentication scheme (GAS) has a vulnerability that allows malicious interruption by any single entity in the process. Moreover, this scheme requires each entity to obtain the tokens of all other entities, which is impractical in a large-scale setting. The cost of authentication and key establishment also depends on the number of users, creating a scalability issue. As a fresh approach to eliminate these issues, this work suggests the use of inner product spaces for group authentication and key establishment. The approach with linear spaces introduces a reduced computation and communication load to establish a common shared key among the group members. In addition to providing lightweight authentication and key agreement, this approach allows any user in a group to make a nonmember a member, which is expected to be useful for autonomous systems in the future. The scheme is designed in a way that the sponsors of such members can easily be recognized by anyone in the group. Unlike the other GASs based on Lagrange's polynomial interpolation, the proposed scheme does not provide a tool for adversaries to compromise the whole group's secrets by using only a few members' shares as well as it allows to recognize a nonmember easily, which prevents the denial-of-service attacks from which the former group authentication algorithms suffer.
引用
收藏
页码:35086 / 35099
页数:14
相关论文
共 50 条
  • [1] A Secure Authentication and Key Establishment Scheme for Wearable Devices
    Kim, MyeongHyun
    Lee, JoonYoung
    Yu, SungJin
    Park, KiSung
    Park, Yohan
    Park, YoungHo
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [2] Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks
    Khan, Sarmad Ullah
    Lavagno, Luciano
    Pastrone, Claudio
    Spirito, Maurizio A.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [3] Authentication and key establishment scheme based on token for mobile commerce
    Chen, Li
    Liu, Jun
    Wang, Huibin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 224 - +
  • [4] A Novel Group Key Establishment Scheme for MANETs
    Zhou, Huihua
    Zheng, Minghui
    Wang, Tianjiang
    CEIS 2011, 2011, 15
  • [5] A Novel Design of Membership Authentication and Group Key Establishment Protocol
    Harn, Lein
    Hsu, Ching-Fang
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [6] Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs
    Cheng, Qi
    Hsu, Chingfang
    Harn, Lein
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [7] A password-based authentication and key establishment scheme for mobile environment
    Liu, Jun
    Liao, Jianxin
    Zhu, Xiaomin
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 99 - +
  • [8] A robust mutual authentication scheme for session initiation protocol with key establishment
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Anitha, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 900 - 916
  • [9] A lightweight anonymous user authentication and key establishment scheme for wearable devices
    Gupta, Ankur
    Tripathi, Meenakshi
    Shaikh, Tabish Jamil
    Sharma, Aakar
    COMPUTER NETWORKS, 2019, 149 : 29 - 42
  • [10] A robust mutual authentication scheme for session initiation protocol with key establishment
    Venkatasamy Sureshkumar
    Ruhul Amin
    R. Anitha
    Peer-to-Peer Networking and Applications, 2018, 11 : 900 - 916