TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things

In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. Owing to the limited ability of the single sensing node, the threshold authe...

Full description

Bibliographic Details
Main Authors: Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8661487/
id doaj-055f5bad5b974be0a73473f03a82eccd
record_format Article
spelling doaj-055f5bad5b974be0a73473f03a82eccd2021-03-29T22:22:47ZengIEEEIEEE Access2169-35362019-01-017301123012510.1109/ACCESS.2019.29022268661487TAW: Cost-Effective Threshold Authentication With Weights for Internet of ThingsZhenhu Ning0Guangquan Xu1https://orcid.org/0000-0001-8701-3944Naixue Xiong2https://orcid.org/0000-0002-0394-4635Yongli Yang3Changxiang Shen4Emmanouil Panaousis5Hao Wang6Kaitai Liang7https://orcid.org/0000-0003-0262-7678Beijing Key Laboratory of Trusted Computing, Faculty of Information Technology, Beijing University of Technology, Beijing, ChinaTianjin Key Laboratory of Advanced Networking, College of Intelligence and Computing, Tianjin University, Tianjin, ChinaTianjin Key Laboratory of Advanced Networking, College of Intelligence and Computing, Tianjin University, Tianjin, ChinaBeijing Key Laboratory of Trusted Computing, Faculty of Information Technology, Beijing University of Technology, Beijing, ChinaBeijing Key Laboratory of Trusted Computing, Faculty of Information Technology, Beijing University of Technology, Beijing, ChinaSurrey Centre of Cyber Security, University of Surrey, Guildford, U.K.Department of Computer Science, Norwegian University of Science and Technology, Trondheim, NorwaySurrey Centre of Cyber Security, University of Surrey, Guildford, U.K.In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. Owing to the limited ability of the single sensing node, the threshold authentication based on the collaboration of sensing nodes can improve the trust of security authentication of sensing nodes. The current threshold authentication schemes may require high-computational complexity, and more importantly, most of them are instantiated by membership authentication. It's challenging to apply the current state of the arts to the case where sensing nodes with various weights join together to fulfill a relatively lightweight authentication. In this paper, we first design a communication key distribution scheme for sensing networks based on a symmetric operator. Using the permutation function, the scheme is able to generate characteristic sequences to improve the efficiency of key distribution in sensing networks. In addition, we propose a threshold authentication scheme based on weights, in which the higher weight represents the more important role in authentication. Our authentication scheme only requires lightweight operations, so that, it is extremely friendly to the IoT nodes with restricted computation power. The security analysis and the case verification demonstrate that our novel authentication protects IoT nodes without yielding significantly computational burden to the nodes.https://ieeexplore.ieee.org/document/8661487/Internet of Thingssymmetric operatorweighted threshold authenticationthreshold equation
collection DOAJ
language English
format Article
sources DOAJ
author Zhenhu Ning
Guangquan Xu
Naixue Xiong
Yongli Yang
Changxiang Shen
Emmanouil Panaousis
Hao Wang
Kaitai Liang
spellingShingle Zhenhu Ning
Guangquan Xu
Naixue Xiong
Yongli Yang
Changxiang Shen
Emmanouil Panaousis
Hao Wang
Kaitai Liang
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
IEEE Access
Internet of Things
symmetric operator
weighted threshold authentication
threshold equation
author_facet Zhenhu Ning
Guangquan Xu
Naixue Xiong
Yongli Yang
Changxiang Shen
Emmanouil Panaousis
Hao Wang
Kaitai Liang
author_sort Zhenhu Ning
title TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
title_short TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
title_full TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
title_fullStr TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
title_full_unstemmed TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things
title_sort taw: cost-effective threshold authentication with weights for internet of things
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. Owing to the limited ability of the single sensing node, the threshold authentication based on the collaboration of sensing nodes can improve the trust of security authentication of sensing nodes. The current threshold authentication schemes may require high-computational complexity, and more importantly, most of them are instantiated by membership authentication. It's challenging to apply the current state of the arts to the case where sensing nodes with various weights join together to fulfill a relatively lightweight authentication. In this paper, we first design a communication key distribution scheme for sensing networks based on a symmetric operator. Using the permutation function, the scheme is able to generate characteristic sequences to improve the efficiency of key distribution in sensing networks. In addition, we propose a threshold authentication scheme based on weights, in which the higher weight represents the more important role in authentication. Our authentication scheme only requires lightweight operations, so that, it is extremely friendly to the IoT nodes with restricted computation power. The security analysis and the case verification demonstrate that our novel authentication protects IoT nodes without yielding significantly computational burden to the nodes.
topic Internet of Things
symmetric operator
weighted threshold authentication
threshold equation
url https://ieeexplore.ieee.org/document/8661487/
work_keys_str_mv AT zhenhuning tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT guangquanxu tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT naixuexiong tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT yongliyang tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT changxiangshen tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT emmanouilpanaousis tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT haowang tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
AT kaitailiang tawcosteffectivethresholdauthenticationwithweightsforinternetofthings
_version_ 1724191697705893888