Authentication and Hand-Over Algorithms for IoT Group

08/27/2019
by   Yucel Aydin, et al.
0

Current advancements in mobility of devices and also Internet of Things (IoT) have replaced the central networks by distributed infrastructure. The more a network is distributed, the more the security of infrastructure and the communication is getting complex. The members in a distributed network create different groups according to their coverage area or their requirements. Mobility nature of the members brings a problem called hand-over of members between groups. Current authentication methods are not applicable due to the lack of resources in the devices.A lightweight authentication method and an easy and fast hand-over process are the current need for the distributed networks. Shamir Secret Sharing algorithm is used for the authentication process in the studies before, but still secure group authentication algorithm and hand-over process are challenges in the group authentication. In this study, a new method is proposed to provide a secure group authentication and hand-over process between groups based on Lagrange's Interpolation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/27/2019

Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication...
research
09/30/2021

A Group Key Establishment Scheme

Group authentication is a method of confirmation that a set of users bel...
research
01/10/2019

Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments

Business analytics processes are often composed from orchestrated, colla...
research
12/16/2020

Group Handover for Drone-Mounted Base Stations

The widespread use of new technologies such as the Internet of things (I...
research
04/09/2018

Lightweight Cryptography for Distributed PKI Based MANETS

Because of lack of infrastructure and Central Authority(CA), secure comm...
research
03/27/2023

Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

The conventional device authentication of wireless networks usually reli...
research
01/16/2020

Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

With the rapid development of various emerging technologies such as the ...

Please sign up or login with your details

Forgot password? Click here to reset