11th EAI International Conference on Mobile Multimedia Communications

Research Article

Identity-Based Group Devices Authentication Scheme for Internet of Things

Download590 downloads
  • @INPROCEEDINGS{10.4108/eai.21-6-2018.2276595,
        author={Jian Shen and Anxi Wang and Leiming Yan and Yongjun Ren and Qi Liu},
        title={Identity-Based Group Devices Authentication Scheme for Internet of Things},
        proceedings={11th EAI International Conference on Mobile Multimedia Communications},
        publisher={EAI},
        proceedings_a={MOBIMEDIA},
        year={2018},
        month={9},
        keywords={internet of things group devices authentication lightweight practical},
        doi={10.4108/eai.21-6-2018.2276595}
    }
    
  • Jian Shen
    Anxi Wang
    Leiming Yan
    Yongjun Ren
    Qi Liu
    Year: 2018
    Identity-Based Group Devices Authentication Scheme for Internet of Things
    MOBIMEDIA
    EAI
    DOI: 10.4108/eai.21-6-2018.2276595
Jian Shen1,*, Anxi Wang1, Leiming Yan1, Yongjun Ren1, Qi Liu1
  • 1: School of Computer and Software, Nanjing University of Information Science & Technology
*Contact email: s_shenjian@126.com

Abstract

Internet of things (IoT) is used to provide real-time data collection and analysis of the target area by the cooperation of low-cost devices. The authentication towards multiple devices has become the research hot-spot considering of the requirement in real applications. Sensitivity and privacy of data have caused widespread concerns because low-cost devices are neither tamper-proof nor capable of performing public key cryptography efficiently. However, many researchers only focus on the authentication between two devices in the network. They ignore the authentication among group devices attached to one network. In this paper, we propose an identity-based group devices authentication scheme for IoT. Note that one device group to be authenticated consists of a group of smart devices. The personal digital assistant (PDA) as the group leader controls authentication operations in its group. From the security analysis, our scheme can resist to various attacks. In addition, the performance analysis shows that our scheme has lower computational cost than the existing scheme.