Lightweight Flexible Group Authentication Utilizing Historical Collaboration Process Information

被引:12
作者
Fang, He [1 ]
Xiao, Zhenlong [2 ]
Wang, Xianbin [3 ]
Al-Dhahir, Naofal [4 ]
机构
[1] Soochow Univ, Sch Elect & Informat Engn, Suzhou 215301, Peoples R China
[2] Xiamen Univ, Sch Informat, Dept Informat & Commun Engn, Xiamen 361005, Peoples R China
[3] Western Univ, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
关键词
Collaboration; Authentication; Security; Protocols; Distance learning; Computer aided instruction; Performance evaluation; Decentralized edge collaboration; group authentication; historical collaboration process information; token generation and verification; MESSAGE-AUTHENTICATION; BATCH AUTHENTICATION; PROVABLY SECURE; SCHEME; EFFICIENT; PROTOCOL; ADMM; MANAGEMENT; INTERNET; PARALLEL;
D O I
10.1109/TCOMM.2023.3240440
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing device authentication techniques may suffer from heavy communication, computation, and storage overhead for identifying a growing number of devices in collaborations. This paper proposes a novel group authentication (GA) method for decentralized edge collaboration by exploiting the historical collaboration process information, i.e., the distributed learning parameters and results from the previous round of collaboration. Two strategies are developed to generate tokens locally at the edge devices' side for mutual authentication, named random token generation (R-TG) and privacy-preserving token generation (PP-TG). Specifically, the R-TG strategy randomly selects several historical learning parameters as tokens, while the PP-TG strategy designs a one-way function to defend against privacy leakage by concealing the historical information. A GA protocol is proposed, where each device simultaneously authenticates the others in the same group by repeating the learning process using their tokens. If the process converges to an expected result, all the devices are authenticated as legitimate group members at once. The proposed scheme provides a lightweight flexible solution without pre-generating and distributing any keys/secrets operating on top of a standardized security protocol, and protects the collaboration continuously. The simulation results demonstrate the viability of our scheme and its superior performance compared to several benchmark schemes.
引用
收藏
页码:2260 / 2273
页数:14
相关论文
共 48 条
  • [1] Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme
    Ahmadian, Zahra
    Jamshidpour, Sadegh
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) : 502 - 510
  • [2] Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Hasbullah, Iznan Husainy
    Manickam, Selvakumar
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (02) : 2422 - 2433
  • [3] Affinely Adjustable Robust ADMM for Residential DER Coordination in Distribution Networks
    Attarha, Ahmad
    Scott, Paul
    Thiebaux, Sylvie
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1620 - 1629
  • [4] A Flexible and Lightweight Group Authentication Scheme
    Aydin, Yucel
    Kurt, Gunes Karabulut
    Ozdemir, Enver
    Yanikomeroglu, Halim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 10277 - 10287
  • [5] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [6] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    [J]. WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [7] Bellare M., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P419, DOI 10.1145/276698.276854
  • [8] Distributed Learning in the Nonconvex World: From batch data to streaming and beyond
    Chang, Tsung-Hui
    Hong, Mingyi
    Wai, Hoi-To
    Zhang, Xinwei
    Lu, Songtao
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2020, 37 (03) : 26 - 38
  • [9] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437
  • [10] Distributed Learning in Wireless Networks: Recent Progress and Future Challenges
    Chen, Mingzhe
    Gunduz, Deniz
    Huang, Kaibin
    Saad, Walid
    Bennis, Mehdi
    Feljan, Aneta Vulgarakis
    Poor, H. Vincent
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (12) : 3579 - 3605