Abstract
In today’s digital world, multiple digital devices are connected to the Internet with the help of IoT devices. An efficient scheme for access control is essential to safeguard IoT data from tampering and unauthorized access. Access control in a group is accomplished by generating a group key which is shared among a device’s group and its current subscribers. This enables the device to encrypt its data, and only the subscribers can decrypt it. Maintaining an efficient group key management technique in an active IoT environment remains a challenge because of the rekeying process. Thus, a competent group key mechanism must be introduced to reduce the overhead in group rekeying. To minimize the storage and overhead in group rekeying in a dynamic IoT environment, a hierarchical heterogeneous ant colony optimization Boolean expression evolver (HHACOBXE) algorithm is proposed to generate an efficient minimal Boolean expression. This approach has an ant manager at Level 2 that identifies the efficient minimal Boolean expression. The working ant agents at level 1 generate a minimal Boolean expression using an ACO-based approach and return the corresponding Boolean expression to the level 2 ant agent. The level 2 ant agent identifies the minimal Boolean expression having minimum keys. HHACOBXE identifies the best solution from a pool of minimal Boolean expressions obtained by a group of working ant agents. The advantage of the HHACOBXE algorithm is that the computational and storage overheads for IoT devices and servers are minimal compared to the existing group rekeying methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Dammak M, Boudia ORM, Messous MA, Senouci SM, Gransart C (2019) Token- based lightweight authentication to secure IoT networks. In: 2019, 16th IEEE annual consumer communications & networking conference (CCNC), Las Vegas, NV, USA, pp 1–4
Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things: challenges, threats, and solutions. Internet of Things 5
AlMajed HN, AlMogren AS (2019) Simple and effective secure group communications in dynamic wireless sensor networks. Sensors, 19
Banks A, Gupta R (2014) MQTT version 3.1.1. OASIS standard
Dammak M, Senouci S-M, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manag 17(3):1742–1757. hal-02965346
Sreelaja NK, Vijayalakshmi Pai GA (2014) Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Appl Soft Comput 19:68–79
Sreelaja NK, Vijayalakshmi Pai GA (2009) Ant colony optimization based message authentication for wireless networks. In: Feng J (ed) Wireless networks: research technology and applications. Nova Science Publishers, pp 373 386
Karuturi NN, Gopalakrishnan R, Srinivasan R, Rangan CP (2008) Foundations of group key management-framework, security model and a generic construction. In: IACR cryptology EPrint
H. Harney and E. Harder, “Logical key hierarchy protocol,” Internet draft, Tech. Rep., 1999.
Balenson D, McGrew D, Sherman A (2000) Key management for large dynamic groups: One-way function trees and amortized initialization
Ding W et al (2019) An extended framework of privacy-preserving computation with flexible access control. IEEE Trans Netw Serv Manag TNSM
Nabeel M, Shang N, Bertino E (2013) Privacy preserving policy-based content sharing in public clouds. IEEE Trans Knowl Data Eng 25(11):2602–2614
Wang X, Zhang J, Schooler EM, Ion M (2014) Performance evaluation of attribute- based encryption: toward data privacy in the IoT. In: IEEE ICC.
Sciancalepore S, Capossele A, Piro G, Boggia G, Bianchi G (2015) Key management protocol with implicit certificates for IoT systems. In: Proceedings of the 2015 workshop on IoT challenges in Mobile and Industrial Systems. ACM, pp 37–42
Tseng Y, Fan C, Wu C (2019) FGAC-NDN: fine-grained access control for named data networks. IEEE Trans Netw Serv Manag 16(1):143–152
Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3:1503–1511
Mapoka TT, Shepherd SJ, Abd-Alhameed RA (2015) A new multiple service key management scheme for secure wireless mobile multicast. IEEE Trans Mobile Comput 14(8):1545–1559. (1 Aug 2015)
Zhong H, Luo W, Cui J (2017) Multiple multicast group key management for the Internet of People. Concurr Comput Pract Exper 29:e3817. https://doi.org/10.1002/cpe.3817
Tsai I-C, Yu C-M, Yokota H, Kuo S-Y (2017) Key management in internet of things via Kronecker product. In: 2017 IEEE 22nd Pacific Rim international symposium on Dependable Computing (PRDC), IEEE
Abdmeziem MR, Tandjaoui D, Romdhani I (2015) A decentralized batch based group key management protocol for mobile internet of things (dbgk). In: 2015 IEEE international conference on computer and information technology
Kung Y, Hsiao H (2018) GroupIt: lightweight group key management for dynamic IoT environments. IEEE Internet Things J 5(6):5155–5165
Cheikhrouhou O, Koubâa A, Dini G, Abid M (2011) RiSeG: A ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquitous Comput 15(8):783–797
Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems. IIoT IEEE Internet Things J. 7(12):11713–11724. https://doi.org/10.1109/JIOT.2020.2999510
Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for noncoherent massive SIMO-enabled industrial IoT communications IEEE Trans. Inf Forensics Secur 15:3722–3733. https://doi.org/10.1109/TIFS.2020.2998947
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT IEEE. J Sel Areas Commun 38(5):942–954. https://doi.org/10.1109/JSAC.2020.2980916
Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber MG, Schmittner C, Bastos J (2019) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296. https://doi.org/10.1109/JIOT.2017.2737630
Rezaeibagha F, Mu Y, Huang X, Yang W, Huang K (2019) Fully secure lightweight certificateless signature scheme for IIoT IEEE. Access 7:144433–144443. https://doi.org/10.1109/ACCESS.2019.2944631
Paliwal S (2019) Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial Internet of Things IEEE. Access 7:136073–136093. https://doi.org/10.1109/ACCESS.2019.2941701
Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial Internet of Things using Rabin cryptosystem Computer. Communication 160:215–227
Li W, Wang P (2019) Two-factor authentication in industrial Internet-of-Things: attacks, evaluation and new construction. Future Gener Comput Syst 101:694–708
Mughal MA, Shi P, Ullah A, Mahmood K, Abid M, Luo X (2019) Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN (LT-SMM). IEEE Access 7
Lakhlef H, Bouabdallah A (2021) Efficient and lightweight group rekeying protocol for communicating things. Comput Electr Eng 91:107021
Hokeun Kim, Eunsuk Kang, Edward A. Lee, and David Broman. 2017. A toolkit for construction of authorization service infrastructure for the internet of things. In: Proceedings of the 2nd ACM/IEEE international conference on internet-of-things design and implementation, Pittsburgh, PA USA, April 2017 (IoTDI 2017). https://doi.org/10.1145/3054977.3054980
Cheikhrouhou O, Koubaa A, Dini G, Alzaid H, Abid M (2012) ‘LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.’ Ad Hoc Netw 10(7):1419–1444
Tiloca M, Dini G (2016) GREP: a group rekeying protocol based on member join history. In: IEEE symposium on computers and communication
Kandi M, Lakhlef H, Bouabdallah A, Challal Y (2020) A versatile key management protocol for secure group and device-to-device communication in the internet of things. J Netw Comput Appl 150
Zhu WT (2005) Optimizing the tree structure in secure multicast key management. IEEE Commun Lett 9(5)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sreelaja, N.K., Sreeja, N.K. (2024). Hierarchical Heterogeneous Ant Colony Optimization-Based Approach to Generate Efficient Minimal Boolean Expressions for Rekeying in Authentication of IoT Devices. In: Dey, N. (eds) Applications of Ant Colony Optimization and its Variants. Springer Tracts in Nature-Inspired Computing. Springer, Singapore. https://doi.org/10.1007/978-981-99-7227-2_9
Download citation
DOI: https://doi.org/10.1007/978-981-99-7227-2_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7226-5
Online ISBN: 978-981-99-7227-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)