Abstract

For many Internet of Things (IoT) scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Classical Group Key Management (GKM) schemes perform inefficiently in dynamic IoT environments, wherein nodes frequently leave or join a network or migrate from one group to another. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior work. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations.

Highlights

  • The number of Internet connected entities was approximately 27 billion in 2019, and is expected to rapidly reach the enormous number of 75 billion by 2025 [1]

  • As in [10], for concreteness, we assume that hashing (Hash) using SHA-256 takes T0 = 460 ns, encryption (Enc) or decryption (Dec) using Advanced Encryption Standard (AES)-256 of block size 64 takes T1 = 800 ns = 1.74T0, and asymmetric decryption (AsyDec) using Elliptical Curve Cryptography (ECC)-224 takes T2 = 114000 ns = 247.83T0

  • We presented a highly efficient and secure Group Key Management (GKM) protocol for dynamic Internet of Things (IoT) settings, which maintains forward and backward secrecy at all times

Read more

Summary

Introduction

The number of Internet connected entities was approximately 27 billion in 2019, and is expected to rapidly reach the enormous number of 75 billion by 2025 [1]. Compared to traditional devices such as desktop computers and laptops, IoT devices have low computational and storage power As a result, they are not able to run the protocols traditionally used to achieve secure communications in the Internet, e.g., those that use public key cryptography [5]. It may relate to the geographical coordinates of a user, medication provided to a patient, customized use of home appliances, parameters and commands exchanged by industrial machinery or security alarms. This broad range of essential functions, without sufficient security, can potentially result in huge losses.

Objectives
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call