Authenticated Hand-Over Algorithm for Group Communication

08/27/2019
by   Yucel Aydin, et al.
0

Shamir or Blakley secret sharing schemes are used for the authentication process in the studies before, but still secure group authentication and hand-over process remain as challenges in group authentication approaches. In this study, a novel method is proposed to provide a secure group authentication. The proposed approach also enables a hand-over process between groups by using Lagrange's polynomial interpolation and Weil pairing in elliptic curve groups for wireless networks with mobility support. One of the advantages of our proposed scheme is that the computational load for a member in the group is lower than the other schemes in the state-of-the-art. It is also possible to authorize many users at the same time, not one-to-one as in the group authentication methods in current cellular networks including Long Term Evolution (LTE). Another advantage that is not covered in other secret sharing methods is that the proposed approach constitutes a practical solution for the hand-over of members between different groups. We have also proposed a solution for replay and man-in-the-middle attacks in secret exchange.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/27/2019

Authentication and Hand-Over Algorithms for IoT Group

Current advancements in mobility of devices and also Internet of Things ...
research
09/30/2021

A Group Key Establishment Scheme

Group authentication is a method of confirmation that a set of users bel...
research
03/27/2023

Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

The conventional device authentication of wireless networks usually reli...
research
03/29/2022

The root extraction problem in braid group-based cryptography

The root extraction problem in braid groups is the following: given a br...
research
11/03/2020

A novel group based cryptosystem based on electromagnetic rotor machine

In this paper, an algorithm is aimed to make a cryptosystem for gray lev...
research
05/24/2023

An Efficient Key Management Scheme For In-Vehicle Network

Vehicle technology has developed rapidly these years, however, the secur...

Please sign up or login with your details

Forgot password? Click here to reset