IoT 18(15): e3

Research Article

A Practical Group Authentication Scheme for Smart Devices in IoT

Download794 downloads
  • @ARTICLE{10.4108/eai.5-3-2019.156719,
        author={Anxi Wang and Jian Shen and Leiming Yan and Yongjun Ren and Qi Liu},
        title={A Practical Group Authentication Scheme for Smart Devices in IoT},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={4},
        number={15},
        publisher={EAI},
        journal_a={IOT},
        year={2018},
        month={7},
        keywords={Internet of things, group devices authentication, lightweight, practical},
        doi={10.4108/eai.5-3-2019.156719}
    }
    
  • Anxi Wang
    Jian Shen
    Leiming Yan
    Yongjun Ren
    Qi Liu
    Year: 2018
    A Practical Group Authentication Scheme for Smart Devices in IoT
    IOT
    EAI
    DOI: 10.4108/eai.5-3-2019.156719
Anxi Wang1, Jian Shen1,*, Leiming Yan1, Yongjun Ren1, Qi Liu1
  • 1: School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China 210044
*Contact email: s_shenjian@126.com

Abstract

Internet of things (IoT) is used to provide real-time data collection and analysis of the target area by the cooperation of low-cost devices. The authentication towards multiple devices has become the research hot-spot considering of the requirement in real applications. Sensitivity and privacy of data have caused widespread concerns because low-cost devices are neither tamper-proof nor capable of performing public key cryptography efficiently. However, many researchers only focus on the authentication between two devices in the network. They ignore the authentication among group devices attached to one network. In this paper, we propose A Practical Group Authentication Scheme for Smart Devices in IoT. Note that one device group to be authenticated consists of a group of smart devices. The personal digital assistant (PDA) as the group leader controls authentication operations in its group. From the security analysis, our scheme can resist to various attacks. In addition, the performance analysis shows that our scheme has lower computational cost than the existing scheme.