Abstract
For many Internet of Things (IoT) scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Classical Group Key Management (GKM) schemes perform inefficiently in dynamic IoT environments, wherein nodes frequently leave or join a network or migrate from one group to another. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior work. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations.
Highlights
The number of Internet connected entities was approximately 27 billion in 2019, and is expected to rapidly reach the enormous number of 75 billion by 2025 [1]
As in [10], for concreteness, we assume that hashing (Hash) using SHA-256 takes T0 = 460 ns, encryption (Enc) or decryption (Dec) using Advanced Encryption Standard (AES)-256 of block size 64 takes T1 = 800 ns = 1.74T0, and asymmetric decryption (AsyDec) using Elliptical Curve Cryptography (ECC)-224 takes T2 = 114000 ns = 247.83T0
We presented a highly efficient and secure Group Key Management (GKM) protocol for dynamic Internet of Things (IoT) settings, which maintains forward and backward secrecy at all times
Summary
The number of Internet connected entities was approximately 27 billion in 2019, and is expected to rapidly reach the enormous number of 75 billion by 2025 [1]. Compared to traditional devices such as desktop computers and laptops, IoT devices have low computational and storage power As a result, they are not able to run the protocols traditionally used to achieve secure communications in the Internet, e.g., those that use public key cryptography [5]. It may relate to the geographical coordinates of a user, medication provided to a patient, customized use of home appliances, parameters and commands exchanged by industrial machinery or security alarms. This broad range of essential functions, without sufficient security, can potentially result in huge losses.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.