About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

Research Article

Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-17081-2_4,
        author={Keyan Abdul-Aziz Mutlaq and Vincent Omollo Nyangaresi and Mohd Adib Omar and Zaid Ameen Abduljabbar},
        title={Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment},
        proceedings={Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings},
        proceedings_a={AC3},
        year={2022},
        month={10},
        keywords={Authentication IoT Key agreement Pseudonymity Time-stamping},
        doi={10.1007/978-3-031-17081-2_4}
    }
    
  • Keyan Abdul-Aziz Mutlaq
    Vincent Omollo Nyangaresi
    Mohd Adib Omar
    Zaid Ameen Abduljabbar
    Year: 2022
    Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
    AC3
    Springer
    DOI: 10.1007/978-3-031-17081-2_4
Keyan Abdul-Aziz Mutlaq1, Vincent Omollo Nyangaresi2, Mohd Adib Omar1,*, Zaid Ameen Abduljabbar3
  • 1: School of Computer Sciences, Universiti Sains Malaysia, USM, 11800
  • 2: Faculty of Biological and Physical Sciences
  • 3: Department of Computer Science, College of Education for Pure Sciences, University of Basrah
*Contact email: adib@usm.my

Abstract

The traditional power grid systems are being replaced with smart grids so as to offer the required levels of flexibility, reliability, efficiency and dynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Consequently, many security and privacy preservation schemes have been developed based on techniques such as elliptic curve cryptography, blockchains, homomorphic encryption, public key certificates and bilinear pairing operations among others. However, these schemes have numerous performance and security constraints. In addition, some of these protocols require tamper proof devices which ride on unrealistic security assumptions. In this paper, a symmetric key based scheme for verification token generation is developed for internet of things communication environment. Extensive performance evaluation is executed in terms of computation, communication and space complexities. The results show that the proposed scheme has relatively low storage complexity, and the least computation and communication complexities. This renders it applicable in smart grid communication environment. In terms of security and privacy, a number of hypotheses are formulated and proofed to show that this scheme is secure under both the Dolev-Yao (DY) and the Canetti-Krawczyk threat models.

Keywords
Authentication IoT Key agreement Pseudonymity Time-stamping
Published
2022-10-06
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-17081-2_4
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL