Smart City Gnosys

Smart city article details

Title Dickson Polynomial-Based Secure Group Authentication Scheme For Internet Of Things
ID_Doc 19878
Authors Syed S.A.; Manickam S.; Uddin M.; Alsufyani H.; Shorfuzzaman M.; Selvarajan S.; Mohammed G.B.
Year 2024
Published Scientific Reports, 14, 1
DOI http://dx.doi.org/10.1038/s41598-024-55044-2
Abstract Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. In order to facilitate this, a secure group authentication scheme that creates trust amongst a group of IoT devices owned by several entities has been proposed. The majority of proposed authentication techniques are made for individual device authentication and are also utilized for group authentication; nevertheless, a unique solution for group authentication is the Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed authentication technique are generated using the Dickson polynomial, which enables the group to authenticate without generating an excessive amount of network traffic overhead. IoT devices' group authentication has made use of the Dickson polynomial. Blockchain technology is employed to enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed at different places. Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this, we have implemented a hardware-based physically unclonable function. Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli’s Testnet framework. Performance analysis has been carried out by choosing various benchmarks and found that the proposed framework outperforms its counterparts through various metrics. Different parameters are also utilized to assess the performance of the proposed blockchain framework and shows that it has better performance in terms of computation, communication, storage and latency. © The Author(s) 2024.
Author Keywords Blockchain technology; Certificate-less; Conditional privacy preservation; Dickson polynomial; Group authentication scheme; Internet of Things


Similar Articles


Id Similarity Authors Title Published
12683 View0.927Singh R.; Sturley S.; Tewari H.Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication For Secure Communication In An Internet Of Things NetworkFuture Internet, 15, 3 (2023)
477 View0.868Huang C.; Yan K.A Blockchain Based Fast Authentication Framework For Iot Networks With Trusted HardwareProceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020 (2020)
12571 View0.855Reddy D.J.; Sreshta G.; Vaishnavi J.V.; Sumasri V.Blockchain With Lightweight Encryption Model For Identity Management In Remote Health CareCognitive Science and Technology, 2025 (2025)
17620 View0.855Jagdish B.V.; Induraj A.; Vikas M.N.; Akshay M.; Naik C.Decentralised Iot Authentication Using Blockchain And Machine Learning: The Trust Circle FrameworkProceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025 (2025)
479 View0.853Sabrina F.; Li N.; Sohail S.A Blockchain Based Secure Iot System Using Device Identity ManagementSensors, 22, 19 (2022)
24669 View0.852Prantl T.; Ten P.; Ifflander L.; Dmitrenko A.; Kounev S.; Krupitzer C.Evaluating The Performance Of A State-Of-The-Art Group-Oriented Encryption Scheme For Dynamic Groups In An Iot ScenarioProceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS, 2020-November (2020)
52793 View0.851Manikandan S.P.; Milton Ganesh S.Sppgkm: A Secure Polynomial Function Powered Group Key Management Scheme For Dynamic User Environments In CloudConcurrency and Computation: Practice and Experience, 34, 21 (2022)
1277 View0.851Chaira M.; Aouag S.; Cherroun H.; Brik B.; Rezgui A.A Decentralized Blockchain-Based Authentication Scheme For Cross-Communication In Iot NetworksCluster Computing, 27, 3 (2024)