论文标题
动态IoT设置的高效,灵活和安全的组密钥管理协议
Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings
论文作者
论文摘要
许多物联网(IoT)方案都需要从具有相似功能的多个设备进行通信和数据获取。对于这种情况,事实证明,以多播和广播形式进行群体交流是有效的。小组密钥管理(GKM)涉及对各组成员的加密密钥的处理,撤销,更新和分发。经典的GKM方案在动态的物联网环境中效力低下,在该环境中,节点经常离开或加入网络或随着时间的推移从一个组迁移到另一组。最近,在动态物联网环境中为GKM提出了“组”方案。但是,该方案有几个局限性,例如对勾结攻击的脆弱性,使用计算昂贵的不对称加密以及对系统秘密的威胁。在本文中,我们为动态物联网设置提供了一种高效且安全的GKM协议,该协议始终保持向前和后方的保密性。我们提出的协议仅使用对称加密,并且完全抵抗串谋攻击。此外,我们的协议具有很高的灵活性,可以处理一些可能发生设备或用户动态的新方案,例如,允许设备组加入或离开网络,用户组的网络,创建或解散,而用户组未由先前文献中提出的方案处理。我们通过广泛的数学分析和数值计算评估了提出的协议的性能,并表明它在用户和设备所产生的通信和计算成本方面优于群组方案。
Many Internet of Things (IoT) scenarios require communication to and data acquisition from multiple devices with similar functionalities. For such scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups. Classical GKM schemes perform inefficiently in dynamic IoT environments, which are those wherein nodes frequently leave or join a network or migrate from one group to another over time. Recently, the `GroupIt' scheme has been proposed for GKM in dynamic IoT environments. However, this scheme has several limitations such as vulnerability to collusion attacks, the use of computationally expensive asymmetric encryption and threats to the backward secrecy of the system. In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times. Our proposed protocol uses only symmetric encryption, and is completely resistant to collusion attacks. Also, our protocol is highly flexible and can handle several new scenarios in which device or user dynamics may take place, e.g., allowing a device group to join or leave the network or creation or dissolution of a user group, which are not handled by schemes proposed in prior literature. We evaluate the performance of the proposed protocol via extensive mathematical analysis and numerical computations, and show that it outperforms the GroupIt scheme in terms of the communication and computation costs incurred by users and devices.