Abstract

Massive MIMO is an essential technology in developing 5G networks and a concept that may be applied to other wireless systems. However, the advantages of adopting massive MIMO for broadband communication are well-established. Recently researcher has been devoted to building communication systems sustaining high communication rates with security. While massive MIMO for Internet-of-Things (IoT) connectivity is still a developing issue, IoT connectivity has requirements and limitations that differ significantly from broadband connections. Although IoT makes people’s lives easier by allowing physical devices to flow through, the interaction of open wireless channels such as Bluetooth, ZigBee, LoRa, Narrowband-Internet of Things (NBIoT), and WiFi, has produced various security and privacy difficulties. Identity authentication is one of the effective solutions for addressing the Internet of Things security and privacy concerns. The typical point-to-point authentication technique ignores the internet of things’ massive number of nodes and limited node resources. Group authentication is an authentication method that simultaneously confirms the identity of a group of members, offering a novel approach to identity identification for the internet of things nodes. However, existing group authentication systems appropriate for the internet of things scenarios pose security issues. They cannot withstand malicious attacks such as forging and replay and cannot prevent group managers from fooling group members. Most existing group authentication schemes are computationally expensive and cannot be applied to resource-constrained IoT scenarios. At the same time, existing systems based on secret-sharing technology cannot resist forgery attacks and replay attacks. The attacker can forge a legal token by modifying the Lagrangian coefficient in the authentication token to pass the group authentication. This work employs verifiable secret sharing technology to create a lightweight verifiable group authentication method (L-IoT-GS) suitable for Internet of Things situations to resist group managers’ deceptive group behavior. Nodes in the Internet of Things scenario can frequently join and leave the network. Because of this, this article proposes a critical update link based on a verified group authentication system for updating group Member rights. According to security analysis, the suggested L-IoT-GS scheme meets accuracy and confidentiality requirements and can withstand malicious attacks such as replay, forgery, and impersonation. Furthermore, performance study and experimental simulation reveal that the L-IoT-GS technique minimizes group members’ computing costs compared to existing standard IoT group authentication schemes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call