Skip navigation

TAW: cost-effective threshold authentication with weights for internet of things

TAW: cost-effective threshold authentication with weights for internet of things

Ning, Zhenhu, Xu, Guangquan, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil, Wang, Hao and Liang, Kaitai (2019) TAW: cost-effective threshold authentication with weights for internet of things. IEEE Access, 7. pp. 30112-30125. ISSN 2169-3536 (Print), 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2902226)

[img]
Preview
PDF (Publisher's PDF - Open Access)
24379 PANAOUSIS_TAW_Cost-effective_Authentication_Internet_Of_Things_(OA)_2019.pdf - Published Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

Abstract

In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. Owing to the limited ability of the single sensing node, the threshold authentication based on the collaboration of sensing nodes can improve the trust of security authentication of sensing nodes. The current threshold authentication schemes may require high-computational complexity, and more importantly, most of them are instantiated by membership authentication. It’s challenging to apply the current state of the arts to the case where sensing nodes with various weights join together to fulfill a relatively lightweight authentication. In this paper, we first design a communication key distribution scheme for sensing networks based on a symmetric operator. Using the permutation function, the scheme is able to generate characteristic sequences to improve the efficiency of key distribution in sensing networks. In addition, we propose a threshold authentication scheme based on weights, in which the higher weight represents the more important role in authentication. Our authentication scheme only requires lightweight operations, so that, it is extremely friendly to the IoT nodes with restricted computation power. The security analysis and the case verification demonstrate that our novel authentication protects IoT nodes without yielding significantly computational burden to the nodes.

Item Type: Article
Uncontrolled Keywords: internet of things, cryptography
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Architecture, Computing & Humanities
Faculty of Architecture, Computing & Humanities > Department of Computing & Information Systems
Faculty of Architecture, Computing & Humanities > Internet of Things and Security (ISEC)
Last Modified: 13 Aug 2019 15:20
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: GREAT 4
URI: http://gala.gre.ac.uk/id/eprint/24379

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics