Skip to main content

Group Authentication with Fault Tolerance for Internet of Things

  • Conference paper
  • First Online:
Ubiquitous Networking (UNet 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10542))

Included in the following conference series:

Abstract

With proliferation of the Internet of Things (IoT) applications, it is expected that 50 billion connected devices will be operating amongst us by 2020, so the normal authentication mechanism will be a big issue to handle to avoid causing a serious burden to server. As it is known, some devices could share the same characteristics such as the same geographical area, the same features. In this case, these devices could be in the same group and the group will be identify by an identity. Taking advantages from this mechanism, all devices can be authenticated at the same time using the group identity. Among group authentication issues are if a member device of the group cannot authenticate with the distributor of the group intentionally or unintentionally, the group loses its identity. This loss of identity causes the authentication failure of the other group devices. To solve this issue in IoT a fault tolerance scheme introduced for the group authentication architecture. Our algorithm of fault tolerance allows reconstructing the group authentication identity despite the lack of broken devices of the group. Indeed, reconstructing the group identity can be performed by using multi-secret sharing scheme based on an error correcting codes if a sufficient number of the group devices are available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  2. Mahalle, P., Jadhav, P.: Group authentication using Pailliar threshold cryptography. IEEE ISBN 978-1-4673-5999-3

    Google Scholar 

  3. Harari, S.: Application des codes correcteurs au partage du secret. Traitement du Sig. 4(4), 353–356 (1987)

    MathSciNet  Google Scholar 

  4. Liu, Y., Cheng, C.: An improved authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 62(11), 2335–2336 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  5. Csirmaz, L.: Gruppen secret sharing or how to share several secrets if you must? Mathematica Slovaca 63(6), 1391–1402 (2013)

    Article  MATH  Google Scholar 

  6. Hill, R.: A First Course in Coding Theory. Oxford University, Oxford (1986)

    MATH  Google Scholar 

  7. Geeta, D.D., Nalini, N., Biradar, R.C.: Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. J. Netw. Comput. Appl. 36(4), 1174–1185 (2013)

    Article  Google Scholar 

  8. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)

    Article  Google Scholar 

  9. Sakarindr, P., Ansari, N.: Survey of security services on group communications. IET Inf. Secur. 4(4), 258–272 (2010)

    Article  Google Scholar 

  10. Anurag, D., Bandyopadhyay, S.: Achieving fault tolerance and network depth in hierarchical wireless sensor networks. In: International Conference on Communications Systems and Telecommunications (2008)

    Google Scholar 

  11. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)

    MATH  Google Scholar 

  12. Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, pp. 276–279 (1993)

    Google Scholar 

  13. Ding, C., Kohel, D.R., Ling, S.: Secret-sharing with a class of ternary codes. Theor. Comput. Sci. 246(1–2), 285–298 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  14. Bulygin, S., Pellikaan, R.: Bounded distance decoding of linear error-correcting codes with Grbner bases. J. Symbolic Comput. 44(12), 1626–1643 (2009)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Otmane Elmouaatamid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Elmouaatamid, O., Lahmer, M., Belkasmi, M. (2017). Group Authentication with Fault Tolerance for Internet of Things. In: Sabir, E., García Armada, A., Ghogho, M., Debbah, M. (eds) Ubiquitous Networking. UNet 2017. Lecture Notes in Computer Science(), vol 10542. Springer, Cham. https://doi.org/10.1007/978-3-319-68179-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68179-5_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68178-8

  • Online ISBN: 978-3-319-68179-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics