Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments

The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing attention. Smart cities represent the ultimate convergence of the IoT, the Cloud, big data, and mobile technology. Smart homes, buildings, and factories create smart cities. In addition, the IoT finds applications in traffic control, public safety, and medical services, permitting group-based communication. As the scale of service grows, the number of things (devices) constituting the service also increases. However, security vulnerabilities arise in group-based communication environments. A device may require authentication when entering a gateway; to secure environments with large numbers of devices (such as those featuring IoT smart metering), the gateways bear heavy loads. Therefore, efficient authentication of group leaders and devices is essential. Here, we develop a dynamic group authentication and key exchange scheme for group-based IoT smart metering environments which enables efficient communication among secure IoT services. Our group authentication scheme increases the computational efficiency of the group leader and the participating devices, based on a threshold secret sharing technique.

[1]  Avishek Adhikari,et al.  An efficient multi-use multi-secret sharing scheme based on hash function , 2010, Appl. Math. Lett..

[2]  Hung-Yu Chien,et al.  Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.

[3]  Toshiaki Tanaka,et al.  A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.

[4]  Jun Shao,et al.  Efficient verifiable multi-secret sharing scheme based on hash function , 2014, Inf. Sci..

[5]  Feng Wang,et al.  Group Authentication and Group Key Distribution for Ad Hoc Networks , 2015, Int. J. Netw. Secur..

[6]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[7]  Xuemin Shen,et al.  GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications , 2016, Comput. Networks.

[8]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[9]  Hiroshi Doi,et al.  ({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants , 2016, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS).

[10]  Joon Heo,et al.  Device authentication protocol for smart grid systems using homomorphic hash , 2012, Journal of Communications and Networks.

[11]  Liqun Chen,et al.  Efficient, XOR-Based, Ideal (t, n)- threshold Schemes , 2016, CANS.

[12]  YoHan Park,et al.  A Selective Group Authentication Scheme for IoT-Based Medical Information System , 2017, Journal of Medical Systems.

[13]  Mehmet Karaköse,et al.  A Cyberphysical System Based Mass-Customization Approach with Integration of Industry 4.0 and Smart City , 2017, Wirel. Commun. Mob. Comput..

[14]  Hong Wang,et al.  EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications , 2013, Int. J. Distributed Sens. Networks.

[15]  Neetesh Saxena,et al.  Secure and privacy-preserving concentration of metering data in AMI networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[16]  Wei-Tsung Su,et al.  A survey of performance improvement by group-based authentication in IoT , 2016, 2016 International Conference on Applied System Innovation (ICASI).

[17]  Feifei Gao,et al.  Efficient and Autonomous Energy Management Techniques for the Future Smart Homes , 2017, IEEE Transactions on Smart Grid.

[18]  Neetesh Saxena,et al.  Integrated Distributed Authentication Protocol for Smart Grid Communications , 2018, IEEE Systems Journal.

[19]  Abdelrahaman Aly,et al.  A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection , 2018, IEEE Transactions on Smart Grid.

[20]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[21]  Imrich Chlamtac,et al.  Smart Meter Data Privacy: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[22]  Jui-Tang Wang,et al.  Group-Based Authentication and Key Agreement , 2012, Wirel. Pers. Commun..

[23]  Jheng-Jia Huang,et al.  Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments , 2016, MobiQuitous.

[24]  Chakravarthy Bhagvati,et al.  CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..

[25]  Ron Steinfeld,et al.  Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..