Generalization of multicast encryption for Internet of Things deployment

被引:0
|
作者
Sharma, Payal [1 ]
Purushothama, B. R. [1 ]
机构
[1] Natl Inst Technol Goa, Dept Comp Sci & Engn, Ponda 403401, Goa, India
关键词
Multicast encryption; Multiple groups; Internet of Things; Provable security; GROUP KEY MANAGEMENT; SECURE MULTICAST; DISTRIBUTION PROTOCOL; GROUP COMMUNICATION; SCHEME; ESTABLISHMENT;
D O I
10.1016/j.jisa.2023.103571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of multicast encryption has been a focus of attention in the Internet of Things environment for the last decade, in which one central server generates and securely distributes a common key designated for a group of IoT devices. These devices can establish secure communication by sending encrypted content within the group using the earlier established group key. It is crucial that the encrypted content can be decrypted only by the member devices. An issue arises when the number of multicast groups increases, and devices tend to be part of various groups simultaneously. Hence we consider a generalization of multicast encryption where multiple multicast groups exist in the IoT environment that are not independent. That means the involvement of an IoT device is not restricted to only one group, which was the case earlier. In our study, the parameters of interest are computational overhead per device, the number of keys stored, and the bandwidth required per transmission as a function of the total number of devices d and the number of groups m. As our main result, we considered two cases in framing efficient and secure solutions for the generalization of multicast encryption. Since several solutions are already proposed for simple multicast encryption techniques, first is the case where it is assumed that a prior optimal solution is already known for multicast encryption and how to build a multi-group scenario out of this. Second, if this situation is not there, we need to define the generalized problem for multicast encryption, which includes overlapped multiple multicast groups. Henceforth, this paper defines important security theorems and their proofs for both cases, along with security models and strong security definitions.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435
  • [2] On the Feasibility of Homomorphic Encryption for Internet of Things
    Reddy, H. Manohar
    Sajimon, P. C.
    Sankaran, Sriram
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [3] Internet of Things Protection and Encryption: A Survey
    Samara, Ghassan
    Quaddoura, Ruzayn
    Al-Shalout, Mooad Imad
    AL-Qawasmi, Khaled
    Al Besani, Ghadeer
    2021 22ND INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2021, : 140 - 146
  • [4] Multicast Routing for Multimedia Communications in the Internet of Things
    Huang, Jun
    Duan, Qiang
    Zhao, Yanxiao
    Zheng, Zhong
    Wang, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 215 - 224
  • [5] Multicast improvement for LOADng in Internet of Things networks
    Sobral, Jose V. V.
    Rodrigues, Joel J. P. C.
    Rabelo, Ricardo A. L.
    Al-Muhtadi, Jalal
    MEASUREMENT, 2019, 148
  • [6] The evolution of multicast: From the MBone to interdomain multicast to Internet2 deployment
    Almeroth, KC
    IEEE NETWORK, 2000, 14 (01): : 10 - 20
  • [7] Gemini: A Green Deployment Scheme for Internet of Things
    Liu, Yanbing
    Meng, Yu
    Huang, Jun
    2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), 2013, : 338 - 343
  • [8] Towards Efficient Deployment in Internet of Robotic Things
    Razafimandimby C.
    Loscri V.
    Vegni A.M.
    Internet of Things, 2018, 0 (9783319612997): : 21 - 37
  • [9] Joint deployment and sleep scheduling of the Internet of things
    Lin, Chun-Cheng
    Peng, Yi-Chun
    Chang, Li-Wei
    Chen, Zheng-Yu
    WIRELESS NETWORKS, 2022, 28 (06) : 2471 - 2483
  • [10] Joint deployment and sleep scheduling of the Internet of things
    Chun-Cheng Lin
    Yi-Chun Peng
    Li-Wei Chang
    Zheng-Yu Chen
    Wireless Networks, 2022, 28 : 2471 - 2483