| Literature DB >> 30347658 |
Abstract
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing attention. Smart cities represent the ultimate convergence of the IoT, the Cloud, big data, and mobile technology. Smart homes, buildings, and factories create smart cities. In addition, the IoT finds applications in traffic control, public safety, and medical services, permitting group-based communication. As the scale of service grows, the number of things (devices) constituting the service also increases. However, security vulnerabilities arise in group-based communication environments. A device may require authentication when entering a gateway; to secure environments with large numbers of devices (such as those featuring IoT smart metering), the gateways bear heavy loads. Therefore, efficient authentication of group leaders and devices is essential. Here, we develop a dynamic group authentication and key exchange scheme for group-based IoT smart metering environments which enables efficient communication among secure IoT services. Our group authentication scheme increases the computational efficiency of the group leader and the participating devices, based on a threshold secret sharing technique.Entities:
Keywords: IoT; group authentication; key exchange; smart metering environments; threshold secret sharing
Year: 2018 PMID: 30347658 PMCID: PMC6210406 DOI: 10.3390/s18103534
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Problems encountered when performing one-to-one authentication in a smart metering environment.
Figure 2Three communication paths in a smart metering environment.
Figure 3Structure of (3,4)-threshold secret sharing.
Figure 4Comparison of general single authentication and group authentication.
Figure 5Group authentication scheme structure with an authentication server.
Figure 6Group authentication scheme (GAS) structure without an authentication server.
Figure 7The smart meter intra-group authentication scheme.
Figure 8The meter data management system (MDMS)-gateway authentication phase.
System parameters.
| Parameter | Explanation |
|---|---|
|
| A |
|
| The polynomial generated by the subscriber authentication server |
|
| Identifier of meter node/gateway |
|
| The distributed secret value to each meter node |
|
| The random one-way hash function |
|
| The mapping hash function of |
|
| The mapping hash function of |
|
| The secret value generated in the polynomial |
|
| Identifier of session |
|
|
|
|
| A randomly selected point generator on an elliptic curve of order |
|
| A randomly selected point on the polynomial by subscriber authentication server/smart meter |
|
| The smart meter master key |
|
|
|
|
| The symmetric key shared by the subscriber authentication server and MDMS |
|
| The secret value shared by the subscriber authentication server and gateway |
|
|
|
|
| The session key between gateways and MDMS |
Analysis of the scheme.
| FeatureComparison | [ | [ | [ | [ | [ | Proposed Scheme |
|---|---|---|---|---|---|---|
|
| ( | ( | ( | ( | ( | ( |
|
| Broadcasting between nodes | Broadcasting between nodes | Broadcasting between nodes | Participation through group leaders | Broadcasting between nodes | Participation through group leaders |
|
| Inter-node mesh | Inter-node mesh | Inter-node mesh | Group leader-node Tree type | Inter-node mesh | Group leader-node Tree type |
|
| X Retransmission when token is disclosed | X Retransmission when token is disclosed | O | O | O | O |
|
| Non-verifiable | Non-verifiable | Non-verifiable | Non-verifiable | Verifiable | Verifiable |
|
| Not provided | Not provided | Reusable keys | Reusable keys | Semi-reusable keys | Reusable keys |
|
|
n: Number of total nodes in group; m: number of nodes participating in group authentication.
Figure 9Comparison of GASs by number of communications.