Skip to main content

Hierarchical Heterogeneous Ant Colony Optimization-Based Approach to Generate Efficient Minimal Boolean Expressions for Rekeying in Authentication of IoT Devices

  • Chapter
  • First Online:
Applications of Ant Colony Optimization and its Variants

Part of the book series: Springer Tracts in Nature-Inspired Computing ((STNIC))

  • 95 Accesses

Abstract

In today’s digital world, multiple digital devices are connected to the Internet with the help of IoT devices. An efficient scheme for access control is essential to safeguard IoT data from tampering and unauthorized access. Access control in a group is accomplished by generating a group key which is shared among a device’s group and its current subscribers. This enables the device to encrypt its data, and only the subscribers can decrypt it. Maintaining an efficient group key management technique in an active IoT environment remains a challenge because of the rekeying process. Thus, a competent group key mechanism must be introduced to reduce the overhead in group rekeying. To minimize the storage and overhead in group rekeying in a dynamic IoT environment, a hierarchical heterogeneous ant colony optimization Boolean expression evolver (HHACOBXE) algorithm is proposed to generate an efficient minimal Boolean expression. This approach has an ant manager at Level 2 that identifies the efficient minimal Boolean expression. The working ant agents at level 1 generate a minimal Boolean expression using an ACO-based approach and return the corresponding Boolean expression to the level 2 ant agent. The level 2 ant agent identifies the minimal Boolean expression having minimum keys. HHACOBXE identifies the best solution from a pool of minimal Boolean expressions obtained by a group of working ant agents. The advantage of the HHACOBXE algorithm is that the computational and storage overheads for IoT devices and servers are minimal compared to the existing group rekeying methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

  2. Dammak M, Boudia ORM, Messous MA, Senouci SM, Gransart C (2019) Token- based lightweight authentication to secure IoT networks. In: 2019, 16th IEEE annual consumer communications & networking conference (CCNC), Las Vegas, NV, USA, pp 1–4

    Google Scholar 

  3. Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things: challenges, threats, and solutions. Internet of Things 5

    Google Scholar 

  4. AlMajed HN, AlMogren AS (2019) Simple and effective secure group communications in dynamic wireless sensor networks. Sensors, 19

    Google Scholar 

  5. Banks A, Gupta R (2014) MQTT version 3.1.1. OASIS standard

    Google Scholar 

  6. Dammak M, Senouci S-M, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manag 17(3):1742–1757. hal-02965346

    Google Scholar 

  7. Sreelaja NK, Vijayalakshmi Pai GA (2014) Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Appl Soft Comput 19:68–79

    Google Scholar 

  8. Sreelaja NK, Vijayalakshmi Pai GA (2009) Ant colony optimization based message authentication for wireless networks. In: Feng J (ed) Wireless networks: research technology and applications. Nova Science Publishers, pp 373 386

    Google Scholar 

  9. Karuturi NN, Gopalakrishnan R, Srinivasan R, Rangan CP (2008) Foundations of group key management-framework, security model and a generic construction. In: IACR cryptology EPrint

    Google Scholar 

  10. H. Harney and E. Harder, “Logical key hierarchy protocol,” Internet draft, Tech. Rep., 1999.

    Google Scholar 

  11. Balenson D, McGrew D, Sherman A (2000) Key management for large dynamic groups: One-way function trees and amortized initialization

    Google Scholar 

  12. Ding W et al (2019) An extended framework of privacy-preserving computation with flexible access control. IEEE Trans Netw Serv Manag TNSM

    Google Scholar 

  13. Nabeel M, Shang N, Bertino E (2013) Privacy preserving policy-based content sharing in public clouds. IEEE Trans Knowl Data Eng 25(11):2602–2614

    Article  Google Scholar 

  14. Wang X, Zhang J, Schooler EM, Ion M (2014) Performance evaluation of attribute- based encryption: toward data privacy in the IoT. In: IEEE ICC.

    Google Scholar 

  15. Sciancalepore S, Capossele A, Piro G, Boggia G, Bianchi G (2015) Key management protocol with implicit certificates for IoT systems. In: Proceedings of the 2015 workshop on IoT challenges in Mobile and Industrial Systems. ACM, pp 37–42

    Google Scholar 

  16. Tseng Y, Fan C, Wu C (2019) FGAC-NDN: fine-grained access control for named data networks. IEEE Trans Netw Serv Manag 16(1):143–152

    Article  Google Scholar 

  17. Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3:1503–1511

    Article  Google Scholar 

  18. Mapoka TT, Shepherd SJ, Abd-Alhameed RA (2015) A new multiple service key management scheme for secure wireless mobile multicast. IEEE Trans Mobile Comput 14(8):1545–1559. (1 Aug 2015)

    Google Scholar 

  19. Zhong H, Luo W, Cui J (2017) Multiple multicast group key management for the Internet of People. Concurr Comput Pract Exper 29:e3817. https://doi.org/10.1002/cpe.3817

  20. Tsai I-C, Yu C-M, Yokota H, Kuo S-Y (2017) Key management in internet of things via Kronecker product. In: 2017 IEEE 22nd Pacific Rim international symposium on Dependable Computing (PRDC), IEEE

    Google Scholar 

  21. Abdmeziem MR, Tandjaoui D, Romdhani I (2015) A decentralized batch based group key management protocol for mobile internet of things (dbgk). In: 2015 IEEE international conference on computer and information technology

    Google Scholar 

  22. Kung Y, Hsiao H (2018) GroupIt: lightweight group key management for dynamic IoT environments. IEEE Internet Things J 5(6):5155–5165

    Article  Google Scholar 

  23. Cheikhrouhou O, Koubâa A, Dini G, Abid M (2011) RiSeG: A ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquitous Comput 15(8):783–797

    Article  Google Scholar 

  24. Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems. IIoT IEEE Internet Things J. 7(12):11713–11724. https://doi.org/10.1109/JIOT.2020.2999510

  25. Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for noncoherent massive SIMO-enabled industrial IoT communications IEEE Trans. Inf Forensics Secur 15:3722–3733. https://doi.org/10.1109/TIFS.2020.2998947

    Article  Google Scholar 

  26. Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT IEEE. J Sel Areas Commun 38(5):942–954. https://doi.org/10.1109/JSAC.2020.2980916

    Article  Google Scholar 

  27. Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber MG, Schmittner C, Bastos J (2019) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296. https://doi.org/10.1109/JIOT.2017.2737630

  28. Rezaeibagha F, Mu Y, Huang X, Yang W, Huang K (2019) Fully secure lightweight certificateless signature scheme for IIoT IEEE. Access 7:144433–144443. https://doi.org/10.1109/ACCESS.2019.2944631

    Article  Google Scholar 

  29. Paliwal S (2019) Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial Internet of Things IEEE. Access 7:136073–136093. https://doi.org/10.1109/ACCESS.2019.2941701

    Article  Google Scholar 

  30. Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial Internet of Things using Rabin cryptosystem Computer. Communication 160:215–227

    Google Scholar 

  31. Li W, Wang P (2019) Two-factor authentication in industrial Internet-of-Things: attacks, evaluation and new construction. Future Gener Comput Syst 101:694–708

    Article  Google Scholar 

  32. Mughal MA, Shi P, Ullah A, Mahmood K, Abid M, Luo X (2019) Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN (LT-SMM). IEEE Access 7

    Google Scholar 

  33. Lakhlef H, Bouabdallah A (2021) Efficient and lightweight group rekeying protocol for communicating things. Comput Electr Eng 91:107021

    Article  Google Scholar 

  34. Hokeun Kim, Eunsuk Kang, Edward A. Lee, and David Broman. 2017. A toolkit for construction of authorization service infrastructure for the internet of things. In: Proceedings of the 2nd ACM/IEEE international conference on internet-of-things design and implementation, Pittsburgh, PA USA, April 2017 (IoTDI 2017). https://doi.org/10.1145/3054977.3054980

  35. Cheikhrouhou O, Koubaa A, Dini G, Alzaid H, Abid M (2012) ‘LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.’ Ad Hoc Netw 10(7):1419–1444

    Article  Google Scholar 

  36. Tiloca M, Dini G (2016) GREP: a group rekeying protocol based on member join history. In: IEEE symposium on computers and communication

    Google Scholar 

  37. Kandi M, Lakhlef H, Bouabdallah A, Challal Y (2020) A versatile key management protocol for secure group and device-to-device communication in the internet of things. J Netw Comput Appl 150

    Google Scholar 

  38. Zhu WT (2005) Optimizing the tree structure in secure multicast key management. IEEE Commun Lett 9(5)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. K. Sreelaja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sreelaja, N.K., Sreeja, N.K. (2024). Hierarchical Heterogeneous Ant Colony Optimization-Based Approach to Generate Efficient Minimal Boolean Expressions for Rekeying in Authentication of IoT Devices. In: Dey, N. (eds) Applications of Ant Colony Optimization and its Variants. Springer Tracts in Nature-Inspired Computing. Springer, Singapore. https://doi.org/10.1007/978-981-99-7227-2_9

Download citation

Publish with us

Policies and ethics