A Group Key Establishment Scheme (2109.15037v2)
Abstract: Group authentication is a method of confirmation that a set of users belong to a group and of distributing a common key among them. Unlike the standard authentication schemes where one central authority authenticates users one by one, group authentication can handle the authentication process at once for all members of the group. The recently presented group authentication algorithms mainly exploit Lagrange's polynomial interpolation along with elliptic curve groups over finite fields. As a fresh approach, this work suggests use of linear spaces for group authentication and key establishment for a group of any size. The approach with linear spaces introduces a reduced computation and communication load to establish a common shared key among the group members. The advantages of using vector spaces make the proposed method applicable to energy and resource constrained devices. In addition to providing lightweight authentication and key agreement, this proposal allows any user in a group to make a non-member to be a member, which is expected to be useful for autonomous systems in the future. The scheme is designed in a way that the sponsors of such members can easily be recognized by anyone in the group. Unlike the other group authentication schemes based on Lagrange's polynomial interpolation, the proposed scheme doesn't provide a tool for adversaries to compromise the whole group secrets by using only a few members' shares as well as it allows to recognize a non-member easily, which prevents service interruption attacks.
- M. O. Demir, A. E. Pusane, G. Dartmann, G. Ascheid, and G. Karabulut Kurt, “A garden of cyber physical systems: Requirements, challenges, and implementation aspects,” IEEE Internet of Things Magazine, vol. 3, no. 3, pp. 84–89, 2020.
- T. Elgamal and K. E. Hickman, “Secure Socket Layer Application Program Apparatus and Method,” Aug. 12 1997, US Patent 5,657,390.
- R. Niboucha, S. B. Saad, A. Ksentini, and Y. Challal, “Zero-touch security management for mMTC network slices: DDoS attack detection and mitigation,” IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7800–7812, 2023.
- L. Harn, “Group Authentication,” IEEE Trans. on Computers, vol. 62, no. 9, pp. 1893–1898, 2012.
- Y. Aydin, G. K. Kurt, E. Ozdemir, and H. Yanikomeroglu, “A flexible and lightweight group authentication scheme,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10 277–10 287, 2020.
- A. Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- M. Patrikakis and Zouraraki, “Denial of Service Attacks,” Internet Protocol Journal, vol. 4, no. 7, pp. 13–25, 2004.
- B. Guo, Z. Yu, X. Zhou, and D. Zhang, “Opportunistic IoT: Exploring the Social Side of the Internet of Things,” in IEEE Int. Conf. on Computer Supported Cooperative Work in Design (CSCWD), 2012, pp. 925–929.
- W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. on Info. Theory, vol. 22, no. 6, pp. 644–654, 1976.
- T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Info. Theory, vol. 31, no. 4, pp. 469–472, 1985.
- R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- R. C. Merkle and M. E. Hellman, “On The Security of Multiple Encryption,” Communications of the ACM, vol. 24, no. 7, pp. 465–467, 1981.
- Y. Park and Y. Park, “A Selective Group Authentication Scheme for IoT-Based Medical Information System,” Journal of Medical Systems, vol. 41, no. 4, p. 48, 2017.
- M. Deepika and A. Sreekumar, “Secret Sharing Scheme Using Gray Code and XOR Operation,” in Int. Conf. on Electrical, Computer and Comm. Tech. (ICECCT), 2017, pp. 1–5.
- C.-F. Hsu, L. Harn, Y. Mu, M. Zhang, and X. Zhu, “Computation-Efficient Key Establishment in Wireless Group Communications,” Wireless Networks, vol. 23, no. 1, pp. 289–297, 2017.
- C. Asmuth and J. Bloom, “A Modular Approach to Key Safeguarding,” IEEE Trans. on Info. Theory, vol. 29, no. 2, pp. 208–210, 1983.
- P. N. Mahalle, N. R. Prasad, and R. Prasad, “Threshold Cryptography-Based Group Authentication (TCGA) Scheme for the Internet of Things (IoT),” in Int. Conf. on Wireless Comm., Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014, pp. 1–5.
- S. Das, G. Laput, C. Harrison, and J. I. Hong, “Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks,” in CHI Conf. on Human Factors in Computing Systems, 2017, pp. 3764–3774.
- S. Gupta, B. L. Parne, and N. S. Chaudhari, “DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks,” Wireless Personal Comm., vol. 98, no. 3, pp. 2867–2899, 2018.
- C. Lai, R. Lu, D. Zheng, H. Li, and X. S. Shen, “GLARM: Group-Based Lightweight Authentication Scheme for Resource-Constrained Machine-to-Machine Communications,” Computer Networks, vol. 99, pp. 66–81, 2016.
- M. Nakkar, R. AlTawy, and A. Youssef, “Gase: A lightweight group authentication scheme with key agreement for edge computing applications,” IEEE Internet of Things Journal, vol. 10, no. 1, pp. 840–854, 2022.
- J. Li, M. Wen, and T. Zhang, “Group-based authentication and key agreement with dynamic policy updating for mtc in lte-a networks,” IEEE Internet of Things Journal, vol. 3, no. 3, pp. 408–417, 2015.
- H. Fang, Z. Xiao, X. Wang, and N. Al-Dhahir, “Lightweight flexible group authentication utilizing historical collaboration process information,” IEEE Transactions on Communications, vol. 7, no. 4, pp. 2260–2273, 2023.
- C. Pu, C. Warner, K.-K. R. Choo, S. Lim, and I. Ahmed, “litegap: Lightweight group authentication protocol for internet of drones systems,” IEEE Transactions on Vehicular Technology, vol. 73, no. 4, pp. 5849–5860, 2024.
- L. Xue, H. Huang, F. Xiao, and W. Wang, “A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2409–2420, 2022.
- P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, 1997.
- S. Mohammadzadeh and O. Kukrer, “Modified Robust Capon Beamforming with Approximate Orthogonal Projection onto the Signal-Plus-Interference Subspace,” Circuits, Systems, and Signal Processing, vol. 37, no. 12, pp. 5351–5368, 2018.
- W. Hoffmann, “Iterative Algorithms for Gram-Schmidt Orthogonalization,” Computing, vol. 41, no. 4, pp. 335–348, 1989.