Authentication and Hand-Over Algorithms for IoT Group

Current advancements in mobility of devices and also Internet of Things (IoT) have replaced the central networks by distributed infrastructure. The more a network is distributed, the more the security of infrastructure and the communication is getting complex. The members in a distributed network create different groups according to their coverage area or their requirements. Mobility nature of the members brings a problem called hand-over of members between groups. Current authentication methods are not applicable due to the lack of resources in the devices.A lightweight authentication method and an easy and fast hand-over process are the current need for the distributed networks. Shamir Secret Sharing algorithm is used for the authentication process in the studies before, but still secure group authentication algorithm and hand-over process are challenges in the group authentication. In this study, a new method is proposed to provide a secure group authentication and hand-over process between groups based on Lagrange's Interpolation.

[1]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[2]  Nitish Mehta,et al.  Group authentication using paillier threshold cryptography , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).

[3]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[4]  Leonardo A. Martucci,et al.  A Lightweight Distributed Group Authentication Mechanism , 2004 .

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Bo Huang,et al.  A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.

[7]  Qiang Ni,et al.  Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks , 2018, IEEE Communications Magazine.

[8]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[9]  Hung-Yu Chien,et al.  Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.

[10]  Ramjee Prasad,et al.  Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT) , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[11]  Mohsen Guizani,et al.  Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.

[12]  Varalakshmi Perumal,et al.  Secure and efficient hand-over authentication in WLAN using elliptic curve RSA , 2017, Comput. Electr. Eng..