Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices

被引:0
|
作者
Minematsu, Kazuhiko [1 ,2 ]
Shikata, Junji [2 ,3 ]
Watanabe, Yohei [4 ,5 ]
Yanai, Naoto [5 ,6 ]
机构
[1] NEC Corp Ltd, Secure Syst Res Labs, Kawasaki 2118666, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Japan
[3] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama 2400067, Japan
[4] Univ Electrocommun, Grad Sch Informat & Engn, Chofu 1828585, Japan
[5] Japan Datacom Co Ltd, Suita 5650871, Japan
[6] Osaka Univ, Grad Sch Informat Sci & Technol, Suita 5650890, Japan
关键词
Anonymous broadcast authentication; applied cryptography; message authentication codes; provable security; remote control system; INTRUSION DETECTION; INTERNET; ENCRYPTION;
D O I
10.1109/ACCESS.2023.3288337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) a system manager broadcasts information to IoT devices, e.g., wireless environment, only the designated devices can identify operations sent from the manager; 2) each IoT device can detect (malicious) manipulation of the broadcast information and hence prevents maliciously generated operations from being executed. In this paper, we introduce anonymous broadcast authentication (ABA) as a core cryptographic primitive of the basic remote-control system. Specifically, we formally define the syntax and security notions for ABA so that it achieves the above requirements. We then show provably-secure ABA constructions and their implementations to provide their practical performance. Our promising results show that the ABA constructions can remotely control devices over a typical wireless network within a second.
引用
收藏
页码:62955 / 62969
页数:15
相关论文
共 42 条
  • [21] An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
    Heydari, Mohammad
    Sadough, Seyed Mohammad Sajad
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Mahmood, Khalid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (12) : 14225 - 14245
  • [22] A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices
    Noura, Hassan N.
    Salman, Ola
    Couturier, Raphael
    Chehab, Ali
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 17885 - 17900
  • [23] Access management of IoT devices using access control mechanism and decentralized authentication: A review
    Singh I.
    Singh B.
    Measurement: Sensors, 2023, 25
  • [24] Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices
    Janes, Blake
    Crawford, Heather
    OConnor, T. J.
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 104 - 109
  • [25] Demo Abstract: Attributed-based Authentication and Access Control for IoT Home Devices
    Maia Neto, Antonio L.
    Pereira, Yuri L.
    Souza, Artur L. F.
    Cunha, Italo
    Oliveira, Leonardo B.
    2018 17TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2018, : 112 - 113
  • [26] Transmission Timing Control Method for IoT Devices Equipped with Poor Oscillator
    Amano, Masaki
    Ohta, Mai
    Taromaru, Makoto
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019), 2019, : 132 - 136
  • [27] An Anonymity, Availability and Security-Ensured Authentication Model of the IoT Control System for Reliable and Anonymous eHealth Services
    Tai, Wei-Liang
    Chang, Ya-Fen
    Lo, Ya-Ling
    JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2019, 39 (04) : 443 - 455
  • [28] An Anonymity, Availability and Security-Ensured Authentication Model of the IoT Control System for Reliable and Anonymous eHealth Services
    Wei-Liang Tai
    Ya-Fen Chang
    Ya-Ling Lo
    Journal of Medical and Biological Engineering, 2019, 39 : 443 - 455
  • [29] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    Kang, Yi
    Zhang, Leihong
    Ye, Hualong
    Zhao, Mantong
    Kanwal, Saima
    Bai, Chunyan
    Zhang, Dawei
    PHOTONICS RESEARCH, 2019, 7 (12) : 1370 - 1380
  • [30] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    YI KANG
    LEIHONG ZHANG
    HUALONG YE
    MANTONG ZHAO
    SAIMA KANWAL
    CHUNYAN BAI
    DAWEI ZHANG
    Photonics Research, 2019, 7 (12) : 1370 - 1380