Dickson polynomial-based secure group authentication scheme for Internet of Things

被引:2
|
作者
Syed, Salman Ali [1 ]
Manickam, Selvakumar [2 ]
Uddin, Mueen [3 ]
Alsufyani, Hamed [4 ]
Shorfuzzaman, Mohammad [5 ]
Selvarajan, Shitharth [6 ,7 ]
Mohammed, Gouse Baig [8 ]
机构
[1] Jouf Univ, Dept Comp Sci, Sakaka, Al Jouf, Saudi Arabia
[2] Univ Sains Malaysia, Natl Adv Ctr IPv6 NAv6, Gelugor 11800, Penang, Malaysia
[3] Univ Doha Sci & Technol, Coll Comp & IT, Doha 24449, Qatar
[4] Saudi Elect Univ, Coll Comp & Informat, Dept Comp Sci, Riyadh 11673, Saudi Arabia
[5] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, Taif 21944, Saudi Arabia
[6] Leeds Beckett Univ, Sch Built Environm Engn & Comp, Leeds LS1 3HE, England
[7] Kebri Dehar Univ, Dept Comp Sci & Engn, Kebri Dehar 250, Ethiopia
[8] Vardhaman Coll Engn, Dept Comp Sci & Engn, Hyderabad, India
关键词
Conditional privacy preservation; Certificate-less; Group authentication scheme; Internet of Things; Dickson polynomial; Blockchain technology; LIGHTWEIGHT GROUP AUTHENTICATION;
D O I
10.1038/s41598-024-55044-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. In order to facilitate this, a secure group authentication scheme that creates trust amongst a group of IoT devices owned by several entities has been proposed. The majority of proposed authentication techniques are made for individual device authentication and are also utilized for group authentication; nevertheless, a unique solution for group authentication is the Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed authentication technique are generated using the Dickson polynomial, which enables the group to authenticate without generating an excessive amount of network traffic overhead. IoT devices' group authentication has made use of the Dickson polynomial. Blockchain technology is employed to enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed at different places. Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this, we have implemented a hardware-based physically unclonable function. Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli's Testnet framework. Performance analysis has been carried out by choosing various benchmarks and found that the proposed framework outperforms its counterparts through various metrics. Different parameters are also utilized to assess the performance of the proposed blockchain framework and shows that it has better performance in terms of computation, communication, storage and latency.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
    Trivedi, Chandan
    Parmar, Keyur
    Rao, Udai Pratap
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) : 665 - 684
  • [22] PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
    Chandan Trivedi
    Keyur Parmar
    Udai Pratap Rao
    Peer-to-Peer Networking and Applications, 2024, 17 : 665 - 684
  • [23] Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain
    Prajapat, Sunil
    Kumar, Pankaj
    Kumar, Dheeraj
    Das, Ashok Kumar
    Hossain, M. Shamim
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38496 - 38507
  • [24] A secure and lightweight authentication scheme for digital forensics in industrial internet of things
    Xiao, Nan
    Wang, Zhaoshun
    Sun, Xiaoxue
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 121 : 117 - 127
  • [25] A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications
    Praveen, R.
    Pabitha, P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 7523 - 7542
  • [26] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu, Wenlong
    Chen, Xuexiao
    Jiang, Linmei
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 101 : 52 - 61
  • [27] A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs
    Rajkumar, Y.
    Kumar, S. V. N. Santhosh
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [28] A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET
    Jiyun Yang
    Jiamin Deng
    Tao Xiang
    Bo Tang
    Nonlinear Dynamics, 2021, 106 : 2655 - 2666
  • [29] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [30] Directed Path Based Authentication Scheme for the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Liu, Qing
    Ji, Genlin
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (09) : 1112 - 1131