Visible to the public Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments

TitleLightweight Authentication Scheme with Dynamic Group Members in IoT Environments
Publication TypeConference Paper
Year of Publication2016
AuthorsHuang, Jheng-Jia, Juang, Wen-Shenq, Fan, Chun-I, Tseng, Yi-Fan, Kikuchi, Hiroaki
Conference NameAdjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4759-4
Keywordscontroller area network security, controller area networks, Dynamic Group Members, Internet of Things, Internet of Things (IoT), lightweight authentication, pubcrawl, Resiliency
Abstract

In IoT environments, the user may have many devices to connect each other and share the data. Also, the device will not have the powerful computation and storage ability. Many studies have focused on the lightweight authentication between the cloud server and the client in this environment. They can use the cloud server to help sensors or proxies to finish the authentication. But in the client side, how to create the group session key without the cloud capability is the most important issue in IoT environments. The most popular application network of IoT environments is the wireless body area network (WBAN). In WBAN, the proxy usually needs to control and monitor user's health data transmitted from the sensors. In this situation, the group authentication and group session key generation is needed. In this paper, in order to provide an efficient and robust group authentication and group session key generation in the client side of IoT environments, we propose a lightweight authentication scheme with dynamic group members in IoT environments. Our proposed scheme can satisfy the properties including the flexible generation of shared group keys, the dynamic participation, the active revocation, the low communication and computation cost, and no time synchronization problem. Also our scheme can achieve the security requirements including the mutual authentication, the group session key agreement, and prevent all various well-known attacks.

URLhttp://doi.acm.org/10.1145/3004010.3004020
DOI10.1145/3004010.3004020
Citation Keyhuang_lightweight_2016