تجاوز إلى المحتوى الرئيسي

“Dickson polynomial-based secure group authentication scheme for Internet of Things

Author name : Salman Ali Syed
Publication Date : 2024-02-28
Journal Name : “Scientific Reports” by Nature publishing group

Abstract

Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted
Authority acts as a sole control in monitoring and maintaining the communications between the
IoT devices and the infrastructure. The communication between the IoT devices happens from one
trusted entity of an area to the other by way of generating security certificates. Establishing trust by
way of generating security certificates for the IoT devices in a smart city application can be of high
cost and expensive. In order to facilitate this, a secure group authentication scheme that creates
trust amongst a group of IoT devices owned by several entities has been proposed. The majority
of proposed authentication techniques are made for individual device authentication and are also
utilized for group authentication; nevertheless, a unique solution for group authentication is the
Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed
authentication technique are generated using the Dickson polynomial, which enables the group
to authenticate without generating an excessive amount of network traffic overhead. IoT devices’
group authentication has made use of the Dickson polynomial. Blockchain technology is employed to
enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed
at different places. Also, the proposed secure group authentication scheme developed based on
Dickson polynomials is resistant to replay, man‑in‑the‑middle, tampering, side channel and signature
forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this,
we have implemented a hardware‑based physically unclonable function. Implementation has been
carried using python language and deployed and tested on Blockchain using Ethereum Goerli’s
Testnet framework. Performance analysis has been carried out by choosing various benchmarks and
found that the proposed framework outperforms its counterparts through various metrics. Different
parameters are also utilized to assess the performance of the proposed blockchain framework and
shows that it has better performance in terms of computation, communication, storage and latency.

Keywords

Conditional privacy preservation, Certificate-less, Group authentication scheme, Internet of Things, Dickson polynomial, Blockchain technology

Publication Link

https://doi.org/10.1038/s41598-024-55044-2

Block_researches_list_suggestions

Suggestions to read

HIDS-IoMT: A Deep Learning-Based Intelligent Intrusion Detection System for the Internet of Medical Things
Ahlem . Harchy Ep Berguiga
Generalized first approximation Matsumoto metric
AMR SOLIMAN MAHMOUD HASSAN
Structure–Performance Relationship of Novel Azo-Salicylaldehyde Disperse Dyes: Dyeing Optimization and Theoretical Insights
EBTSAM KHALEFAH H ALENEZY
“Synthesis and Characterization of SnO₂/α-Fe₂O₃, In₂O₃/α-Fe₂O₃, and ZnO/α-Fe₂O₃ Thin Films: Photocatalytic and Antibacterial Applications”
Asma Arfaoui
تواصل معنا