GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications

被引:17
作者
Nakkar, Mouna [1 ]
AlTawy, Riham [2 ]
Youssef, Amr [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P 5C2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication; Protocols; Servers; Internet of Things; Edge computing; Cloud computing; Cryptography; Aggregated message authentication code (Agg-MAC); edge computing (EC); group authentication; massive machine-type communication (mMTC); secret sharing; NB-IOT; SECRET; PROTOCOL; AGGREGATE; DEVICES;
D O I
10.1109/JIOT.2022.3204335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the fact that mass authentication is one of the desirable security features in the edge computing paradigm, we propose a lightweight group authentication protocol with a session key-agreement. Most of the previously proposed group authentication schemes (GASs) are heavyweight and do not support multiple authentications or key-agreement. On the other hand, our protocol, which is based on secret sharing scheme and aggregated message authentication code, is lightweight and provides multiple asynchronous authentications. Furthermore, we implement a simple key refreshing mechanism in which, in each session, a new session-key between an Internet of Things node and the authenticating server is established without the need for redistributing new shares. Our security analysis includes proving that our protocol provides group authentication, message forward secrecy, and prevents several attacks. Additionally, we present a formal automated verification using Verifpal tool. Furthermore, we show that our scheme has better performance than other relative schemes in terms of communication complexity, secret-share redistribution, and session key derivations.
引用
收藏
页码:840 / 854
页数:15
相关论文
共 67 条
[1]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[2]  
[Anonymous], Automated validation of internet security protocols and applications
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   A Flexible and Lightweight Group Authentication Scheme [J].
Aydin, Yucel ;
Kurt, Gunes Karabulut ;
Ozdemir, Enver ;
Yanikomeroglu, Halim .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :10277-10287
[5]  
Baritel-Ruet C, FORMAL SECURITY PROO
[6]  
Barras B., 1997, THESIS INRIA PARIS F
[7]  
Basudan Sultan, 2020, [Journal of Communications and Information Networks, 通信与信息网络学报], V5, P457
[8]  
Blakley G. R., 1979, P AFIPS NAT COMP C J, P313
[9]   Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif [J].
Blanchet, Bruno .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8604 :54-87
[10]  
Blanchet B., 2016, Found Trends Privacy Sec, V1, P1, DOI DOI 10.1561/3300000004