Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

08/16/2020
by   Adhirath Kabra, et al.
0

Many Internet of Things (IoT) scenarios require communication to and data acquisition from multiple devices with similar functionalities. For such scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups. Classical GKM schemes perform inefficiently in dynamic IoT environments, which are those wherein nodes frequently leave or join a network or migrate from one group to another over time. Recently, the `GroupIt' scheme has been proposed for GKM in dynamic IoT environments. However, this scheme has several limitations such as vulnerability to collusion attacks, the use of computationally expensive asymmetric encryption and threats to the backward secrecy of the system. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times. Our proposed protocol uses only symmetric encryption, and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior literature. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations, and show that it outperforms the GroupIt scheme in terms of the communication and computation costs incurred by users and devices.

READ FULL TEXT
research
05/20/2021

Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks

Home automation Internet of Things (IoT) systems have recently become a ...
research
02/26/2020

Peripheral-free Device Pairing by Randomly Switching Power

The popularity of Internet-of-Things (IoT) comes with security concerns....
research
07/27/2022

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

Industrial IoT (IIoT) aims to enhance services provided by various indus...
research
02/16/2020

AMOUN: Asymmetric lightweight cryptographic scheme for wireless group communication

Multi-recipient cryptographic schemes provide secure communication, betw...
research
10/13/2022

Multi-recipient and threshold encryption based on hidden multipliers

In this paper, a scheme is proposed that allow the dealer to encrypt mes...
research
04/28/2023

Hybrid Key Authentication Scheme for Privacy over Adhoc Communication

Since communication signals are publicly exposed while they transmit acr...
research
06/09/2021

FastZIP: Faster and More Secure Zero-Interaction Pairing

With the advent of the Internet of Things (IoT), establishing a secure c...

Please sign up or login with your details

Forgot password? Click here to reset