Group Authentication and Key Establishment Scheme

被引:0
|
作者
Guzey, Sueda [1 ]
Kurt, Gunes Karabulut [2 ]
Ozdemir, Enver [1 ]
机构
[1] Istanbul Tech Univ, Inst Informat, TR-34330 Istanbul, Turkiye
[2] Polytech Montreal, Dept Elect Engn, Montreal, PQ H3C 3A7, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 21期
关键词
Authentication; Polynomials; Interpolation; Internet of Things; Costs; Elliptic curves; Galois fields; Elliptic curve cryptography; group authentication; inner product; secret-sharing schemes; vector spaces;
D O I
10.1109/JIOT.2024.3436652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group authentication is a technique that verifies the group membership of multiple users and establishes a shared secret key among them. Unlike the conventional authentication schemes that rely on a central authority to authenticate each user individually, group authentication can perform the authentication process simultaneously for all the members who participate. Group authentication has been found to be a suitable candidate for various applications in crowded in Internet of Things (IoT) environments, such as swarms of drones for agriculture, military, and surveillance, where a group of devices need to establish a secure authenticated communication channel among themselves. The recently presented group authentication algorithms mainly exploit Lagrange polynomial interpolation along with elliptic curve groups over finite fields. A polynomial interpolation-based group authentication scheme (GAS) has a vulnerability that allows malicious interruption by any single entity in the process. Moreover, this scheme requires each entity to obtain the tokens of all other entities, which is impractical in a large-scale setting. The cost of authentication and key establishment also depends on the number of users, creating a scalability issue. As a fresh approach to eliminate these issues, this work suggests the use of inner product spaces for group authentication and key establishment. The approach with linear spaces introduces a reduced computation and communication load to establish a common shared key among the group members. In addition to providing lightweight authentication and key agreement, this approach allows any user in a group to make a nonmember a member, which is expected to be useful for autonomous systems in the future. The scheme is designed in a way that the sponsors of such members can easily be recognized by anyone in the group. Unlike the other GASs based on Lagrange's polynomial interpolation, the proposed scheme does not provide a tool for adversaries to compromise the whole group's secrets by using only a few members' shares as well as it allows to recognize a nonmember easily, which prevents the denial-of-service attacks from which the former group authentication algorithms suffer.
引用
收藏
页码:35086 / 35099
页数:14
相关论文
共 50 条
  • [21] Lightweight Authentication and Key Establishment Scheme for Cloud-Network-End Integrated System
    Tian, Chuang
    Zhang, Junwei
    Li, Teng
    Ma, Zhuo
    Shen, Yulong
    Ma, Jianfeng
    2023 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATIONS AND NETWORKS, FCN, 2023,
  • [22] Authentication and Key Establishment in WSN Based on Key Predistribution
    N. N. Shenets
    Automatic Control and Computer Sciences, 2022, 56 : 947 - 956
  • [23] Authentication and Key Establishment in WSN Based on Key Predistribution
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 947 - 956
  • [24] An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Cheng, Pu-Jen
    2015 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2015, : 1316 - 1321
  • [25] Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
    Sun, Mei
    Guo, Yuyan
    Zhang, Dongbing
    Jiang, MingMing
    COMPLEXITY, 2021, 2021
  • [26] An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Cheng, Pu-Jen
    IEEE INTELLIGENT SYSTEMS, 2016, 31 (06) : 35 - 43
  • [27] GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications
    Nakkar, Mouna
    AlTawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 840 - 854
  • [28] A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET
    Lim, Kiho
    Tuladhar, Kastuv M.
    Wang, Xiwei
    Liu, Weihua
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017,
  • [29] A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments
    Bai, Linyan
    Hsu, Chingfang
    Harn, Lein
    Cui, Jianqun
    Zhao, Zhuo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3535 - 3545
  • [30] Secure Authentication and Key Establishment in the SIP Architecture
    Malina, Lukas
    Zukal, Martin
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 14 - 18