Distributed Multiparty Key Management for Efficient Authentication in the Internet of Things

被引:12
作者
Mahmood, Zahid [1 ,2 ]
Ullah, Ata [1 ,3 ]
Ning, Huansheng [1 ,2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Beijing Engn Res Ctr Cyberspace Data Anal & Appli, Beijing 100083, Peoples R China
[3] Natl Univ Modern Languages, Dept Comp Sci, Islamabad 44000, Pakistan
基金
中国国家自然科学基金;
关键词
Chaotic maps; multiparty-key; chebyshev polynomials; smartness; key establishment; USER AUTHENTICATION; AGREEMENT SCHEME; CHAOTIC MAP; SYSTEM; SECURITY; PROTOCOL;
D O I
10.1109/ACCESS.2018.2840131
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the inclusion of mobile devices and ubiquitous connectivity of smart devices in Internet of Things, secure key management is mandatory to ensure privacy for information exchange. In this regard, the multiparty key establishment schemes achieve better security strength by taking shared parameters from neighboring member nodes to calculate the key. The similar multiparty mechanism can be adopted among other hierarchical nodes, including head node, server and gateway node. Moreover, session keys can also be set up in a similar manner. The main problem in multiparty password-based authentication schemes is the computation of extensively hard problem that limits it to three parties and N-party is quite more complex or infeasible. This paper presents a novel distributed multiparty keying scheme where chaotic maps are used to provide one-way hashing and Chebyshev polynomial are used for establishing a common multiparty key. In this paper, Phase-I covers keying among trusted server and group heads and Phase-II elaborates the key establishment among smart devices and their group heads. The scheme is verified through the formal specification and security analysis using Rubin Logic for inter-group key establishment scenario. We have validated the intra-group and inter-group key establishment by doing extensive simulations in NS 2.35. Moreover, a test bed is setup for group head to server level authentication and key establishment. Results prove the supremacy of our scheme as compared with preliminaries in terms of computation cost, communication cost, and resilience.
引用
收藏
页码:29460 / 29473
页数:14
相关论文
共 45 条
[1]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[4]  
Cheng ZY, 2013, INT J INNOV COMPUT I, V9, P1935
[5]   An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment [J].
Chiou, Shin-Yan ;
Lin, Ching-Hsuan .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[6]   CHAOS SHIFT KEYING - MODULATION AND DEMODULATION OF A CHAOTIC CARRIER USING SELF-SYNCHRONIZING CHUA CIRCUITS [J].
DEDIEU, H ;
KENNEDY, MP ;
HASLER, M .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-ANALOG AND DIGITAL SIGNAL PROCESSING, 1993, 40 (10) :634-642
[7]   Edge of Things: The Big Picture on the integration of Edge, IoT and the Cloud in a Distributed Computing Environment [J].
El-Sayed, Hesham ;
Sankar, Sharmi ;
Prasad, Mukesh ;
Puthal, Deepak ;
Gupta, Akshansh ;
Mohanty, Manoranjan ;
Lin, Chin-Teng .
IEEE ACCESS, 2018, 6 :1706-1717
[8]   Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian ;
Kumari, Saru .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
[9]  
FELDMANN U, 1995, IEEE INT SYMP CIRC S, P680, DOI 10.1109/ISCAS.1995.521605
[10]  
Garcia-Bosque M, 2017, P IEEE INT INSTR MEA, P1