Abstract
With proliferation of the Internet of Things (IoT) applications, it is expected that 50 billion connected devices will be operating amongst us by 2020, so the normal authentication mechanism will be a big issue to handle to avoid causing a serious burden to server. As it is known, some devices could share the same characteristics such as the same geographical area, the same features. In this case, these devices could be in the same group and the group will be identify by an identity. Taking advantages from this mechanism, all devices can be authenticated at the same time using the group identity. Among group authentication issues are if a member device of the group cannot authenticate with the distributor of the group intentionally or unintentionally, the group loses its identity. This loss of identity causes the authentication failure of the other group devices. To solve this issue in IoT a fault tolerance scheme introduced for the group authentication architecture. Our algorithm of fault tolerance allows reconstructing the group authentication identity despite the lack of broken devices of the group. Indeed, reconstructing the group identity can be performed by using multi-secret sharing scheme based on an error correcting codes if a sufficient number of the group devices are available.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2013)
Mahalle, P., Jadhav, P.: Group authentication using Pailliar threshold cryptography. IEEE ISBN 978-1-4673-5999-3
Harari, S.: Application des codes correcteurs au partage du secret. Traitement du Sig. 4(4), 353–356 (1987)
Liu, Y., Cheng, C.: An improved authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 62(11), 2335–2336 (2013)
Csirmaz, L.: Gruppen secret sharing or how to share several secrets if you must? Mathematica Slovaca 63(6), 1391–1402 (2013)
Hill, R.: A First Course in Coding Theory. Oxford University, Oxford (1986)
Geeta, D.D., Nalini, N., Biradar, R.C.: Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. J. Netw. Comput. Appl. 36(4), 1174–1185 (2013)
Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
Sakarindr, P., Ansari, N.: Survey of security services on group communications. IET Inf. Secur. 4(4), 258–272 (2010)
Anurag, D., Bandyopadhyay, S.: Achieving fault tolerance and network depth in hierarchical wireless sensor networks. In: International Conference on Communications Systems and Telecommunications (2008)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)
Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, pp. 276–279 (1993)
Ding, C., Kohel, D.R., Ling, S.: Secret-sharing with a class of ternary codes. Theor. Comput. Sci. 246(1–2), 285–298 (2000)
Bulygin, S., Pellikaan, R.: Bounded distance decoding of linear error-correcting codes with Grbner bases. J. Symbolic Comput. 44(12), 1626–1643 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Elmouaatamid, O., Lahmer, M., Belkasmi, M. (2017). Group Authentication with Fault Tolerance for Internet of Things. In: Sabir, E., GarcÃa Armada, A., Ghogho, M., Debbah, M. (eds) Ubiquitous Networking. UNet 2017. Lecture Notes in Computer Science(), vol 10542. Springer, Cham. https://doi.org/10.1007/978-3-319-68179-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-68179-5_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68178-8
Online ISBN: 978-3-319-68179-5
eBook Packages: Computer ScienceComputer Science (R0)