A group key agreement protocol for intelligent internet of things system

被引:21
|
作者
Zhang, Qikun [1 ]
Zhu, Liang [1 ]
Li, Yongjiao [1 ]
Ma, Zhaorui [2 ]
Yuan, Junling [1 ]
Zheng, Jun [3 ]
Ai, Shan [4 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou, Peoples R China
[2] Zhengzhou Univ Light Ind, Informat Management Ctr, Zhengzhou, Peoples R China
[3] Beijing Inst Technol, Cyberspace Sci & Technol, Beijing, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
group communications; hierarchical group key agreement; information exchange; intelligent internet of things; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1002/int.22644
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are essential. A secure communication channel for intelligent terminals can be established through group key agreement (GKA), thereby ensuring the security communication and resource sharing for intelligent terminals. Taking into account the confidentiality level of the shared resources of each terminal, and the different permissions of the resource sharing of each terminal, a GKA protocol for intelligent IoTs is proposed. Compared with previous work, this protocol mainly has the following advantages: (1) The hidden attribute identity authentication technology can achieve the security of identity authentication and protect personal privacy from being leaked; (2) Only intelligent terminals satisfying the threshold required of the GKA can participate in the GKA, which increases the security of group communication; (3) Low-level group terminals can obtain new permissions to participate in high-level group communication if they meet certain conditions. High-level group terminals can participate in low-level group communication through permission authentication, which increases the flexibility and security of group communication; (4) The intelligent terminals in the group can use their own attribute permission parameters to calculate the group key. They can verify the correctness of the calculated group key through a functional relationship, and does not need to exchange information with other members in the same group. Under the hardness assumption of inverse computational Diffie-Hellman problem and discrete logarithm problem, it is proven that the protocol has high security, and compared with the cited literatures, it has good advantages in terms of computational complexity, time cost and communication energy cost.
引用
收藏
页码:699 / 722
页数:24
相关论文
共 50 条
  • [21] AKAIoTs: authenticated key agreement for Internet of Things
    Mutaz Elradi S. Saeed
    Qun-Ying Liu
    GuiYun Tian
    Bin Gao
    Fagen Li
    Wireless Networks, 2019, 25 : 3081 - 3101
  • [22] Authentication and Key Agreement Protocol for Ad Hoc Networks Based on the Internet of Things Paradigm
    Turkanovic, Muhamed
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 153 - +
  • [23] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [24] BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things
    Lansky, Jan
    Rahmani, Amir Masoud
    Ali, Saqib
    Bagheri, Nasour
    Safkhani, Masoumeh
    Hassan Ahmed, Omed
    Hosseinzadeh, Mehdi
    MATHEMATICS, 2021, 9 (24)
  • [25] Blockchain-based asymmetric group key agreement protocol for internet of vehicles
    Zhang, Qikun
    Li, Yongjiao
    Wang, Ruifang
    Li, Jianyong
    Gan, Yong
    Zhang, Yanhua
    Yu, Xiao
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [26] Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios
    Chien, Hung-Yu
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 1890 - 1903
  • [27] An efficient group key agreement protocol
    Jung, BE
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (02) : 106 - 107
  • [28] On the security of a group key agreement protocol
    Tang, Qiang
    COMPUTER JOURNAL, 2007, 50 (05): : 589 - 590
  • [29] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Rana, Saurabh
    Mishra, Dheerendra
    Arora, Riya
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (01) : 727 - 747
  • [30] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Saurabh Rana
    Dheerendra Mishra
    Riya Arora
    Wireless Personal Communications, 2021, 119 : 727 - 747