IoT 21(25): e2

Research Article

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

Download73 downloads
  • @ARTICLE{10.4108/eai.3-3-2021.168862,
        author={Adhirath Kabra and Sumit Kumar and Gaurav S. Kasbekar},
        title={Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={7},
        number={25},
        publisher={EAI},
        journal_a={IOT},
        year={2021},
        month={3},
        keywords={Internet of Things, Sensors, Trust, Security and Privacy},
        doi={10.4108/eai.3-3-2021.168862}
    }
    
  • Adhirath Kabra
    Sumit Kumar
    Gaurav S. Kasbekar
    Year: 2021
    Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings
    IOT
    EAI
    DOI: 10.4108/eai.3-3-2021.168862
Adhirath Kabra1, Sumit Kumar2, Gaurav S. Kasbekar3,*
  • 1: Department of Computer Science, Aalto University, Espoo, Finland
  • 2: Center for Artificial Intelligence and Robotics (CAIR), Defence Research and Development Organisation (DRDO), Bangalore, India
  • 3: Department of Electrical Engineering, IIT Bombay, Mumbai, India
*Contact email: gskasbekar@ee.iitb.ac.in

Abstract

For many Internet of Things (IoT) scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Classical Group Key Management (GKM) schemes perform inefficiently in dynamic IoT environments, wherein nodes frequently leave or join a network or migrate from one group to another. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior work. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations.