A group key agreement protocol for intelligent internet of things system

被引:21
|
作者
Zhang, Qikun [1 ]
Zhu, Liang [1 ]
Li, Yongjiao [1 ]
Ma, Zhaorui [2 ]
Yuan, Junling [1 ]
Zheng, Jun [3 ]
Ai, Shan [4 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou, Peoples R China
[2] Zhengzhou Univ Light Ind, Informat Management Ctr, Zhengzhou, Peoples R China
[3] Beijing Inst Technol, Cyberspace Sci & Technol, Beijing, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
group communications; hierarchical group key agreement; information exchange; intelligent internet of things; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1002/int.22644
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are essential. A secure communication channel for intelligent terminals can be established through group key agreement (GKA), thereby ensuring the security communication and resource sharing for intelligent terminals. Taking into account the confidentiality level of the shared resources of each terminal, and the different permissions of the resource sharing of each terminal, a GKA protocol for intelligent IoTs is proposed. Compared with previous work, this protocol mainly has the following advantages: (1) The hidden attribute identity authentication technology can achieve the security of identity authentication and protect personal privacy from being leaked; (2) Only intelligent terminals satisfying the threshold required of the GKA can participate in the GKA, which increases the security of group communication; (3) Low-level group terminals can obtain new permissions to participate in high-level group communication if they meet certain conditions. High-level group terminals can participate in low-level group communication through permission authentication, which increases the flexibility and security of group communication; (4) The intelligent terminals in the group can use their own attribute permission parameters to calculate the group key. They can verify the correctness of the calculated group key through a functional relationship, and does not need to exchange information with other members in the same group. Under the hardness assumption of inverse computational Diffie-Hellman problem and discrete logarithm problem, it is proven that the protocol has high security, and compared with the cited literatures, it has good advantages in terms of computational complexity, time cost and communication energy cost.
引用
收藏
页码:699 / 722
页数:24
相关论文
共 50 条
  • [31] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [32] On the adoption of PUF for key agreement scheme in Internet of Things
    Barbareschi, Mario
    Emmanuele, Antonio
    Casola, Valentina
    Lombardi, Daniele
    PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2024-WORKSHOPS AND SPECIAL SESSIONS, CF 2024 COMPANION, 2024, : 17 - 24
  • [33] Key Exposure Resistant Group Key Agreement Protocol
    Zhou, Tianqi
    Shen, Jian
    Ji, Sai
    Ren, Yongjun
    Zhang, Mingwu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 83 - 97
  • [34] Blockchain-Based Partial Group Key Agreement Protocol for Intelligent Transportation Systems
    Chhikara, Deepak
    Rana, Saurabh
    Singh, Gyaneshwar
    Mishra, Dheerendra
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16701 - 16710
  • [35] Intelligent assembly system for mechanical products and key technology based on internet of things
    Mingzhou Liu
    Jing Ma
    Ling Lin
    Maogen Ge
    Qiang Wang
    Conghu Liu
    Journal of Intelligent Manufacturing, 2017, 28 : 271 - 299
  • [36] Intelligent assembly system for mechanical products and key technology based on internet of things
    Liu, Mingzhou
    Ma, Jing
    Lin, Ling
    Ge, Maogen
    Wang, Qiang
    Liu, Conghu
    JOURNAL OF INTELLIGENT MANUFACTURING, 2017, 28 (02) : 271 - 299
  • [37] A novel batch-based group key management protocol applied to the Internet of Things
    Veltri, Luca
    Cirani, Simone
    Busanelli, Stefano
    Ferrari, Gianluigi
    AD HOC NETWORKS, 2013, 11 (08) : 2724 - 2737
  • [38] LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
    Soni, Mukesh
    Singh, Dileep Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1067 - 1084
  • [39] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Nikravan, Mohammad
    Reza, Akram
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (01) : 463 - 494
  • [40] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Mohammad Nikravan
    Akram Reza
    Wireless Personal Communications, 2020, 111 : 463 - 494