A group key agreement protocol for intelligent internet of things system

被引:21
|
作者
Zhang, Qikun [1 ]
Zhu, Liang [1 ]
Li, Yongjiao [1 ]
Ma, Zhaorui [2 ]
Yuan, Junling [1 ]
Zheng, Jun [3 ]
Ai, Shan [4 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou, Peoples R China
[2] Zhengzhou Univ Light Ind, Informat Management Ctr, Zhengzhou, Peoples R China
[3] Beijing Inst Technol, Cyberspace Sci & Technol, Beijing, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
group communications; hierarchical group key agreement; information exchange; intelligent internet of things; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1002/int.22644
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are essential. A secure communication channel for intelligent terminals can be established through group key agreement (GKA), thereby ensuring the security communication and resource sharing for intelligent terminals. Taking into account the confidentiality level of the shared resources of each terminal, and the different permissions of the resource sharing of each terminal, a GKA protocol for intelligent IoTs is proposed. Compared with previous work, this protocol mainly has the following advantages: (1) The hidden attribute identity authentication technology can achieve the security of identity authentication and protect personal privacy from being leaked; (2) Only intelligent terminals satisfying the threshold required of the GKA can participate in the GKA, which increases the security of group communication; (3) Low-level group terminals can obtain new permissions to participate in high-level group communication if they meet certain conditions. High-level group terminals can participate in low-level group communication through permission authentication, which increases the flexibility and security of group communication; (4) The intelligent terminals in the group can use their own attribute permission parameters to calculate the group key. They can verify the correctness of the calculated group key through a functional relationship, and does not need to exchange information with other members in the same group. Under the hardness assumption of inverse computational Diffie-Hellman problem and discrete logarithm problem, it is proven that the protocol has high security, and compared with the cited literatures, it has good advantages in terms of computational complexity, time cost and communication energy cost.
引用
收藏
页码:699 / 722
页数:24
相关论文
共 50 条
  • [41] LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
    Mukesh Soni
    Dileep Kumar Singh
    Wireless Personal Communications, 2022, 127 : 1067 - 1084
  • [42] Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1133 - 1146
  • [43] Key Technology for Intelligent Interaction Based on Internet of Things
    Wang, Tianlin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2019, 10 (01) : 25 - 36
  • [44] A key agreement protocol based on group actions
    Cagman, Abdullah
    Polat, Kadirhan
    Tas, Sait
    NUMERICAL METHODS FOR PARTIAL DIFFERENTIAL EQUATIONS, 2021, 37 (02) : 1112 - 1119
  • [45] A secure key agreement protocol for dynamic group
    Muhammad Bilal
    Shin-Gak Kang
    Cluster Computing, 2017, 20 : 2779 - 2792
  • [46] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +
  • [47] A group key agreement protocol from pairings
    Duursma, I
    Lee, HS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1451 - 1456
  • [48] A secure key agreement protocol for dynamic group
    Bilal, Muhammad
    Kang, Shin-Gak
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2779 - 2792
  • [49] Analysis of an efficient group key agreement protocol
    Lee, Su Mi
    Lee, Dong Hoon
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 638 - 639
  • [50] An efficient dynamic group key agreement protocol
    College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
    Zhejiang Daxue Xuebao (Gongxue Ban), 2007, 2 (236-238+244):