Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices

نویسندگان

چکیده

We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) manager broadcasts information devices, e.g., wireless environment, only the designated devices can identify operations sent from manager; 2) each device detect (malicious) manipulation of broadcast hence prevents maliciously generated being executed. In this paper, introduce anonymous authentication (ABA) as core cryptographic primitive remote-control system. formally define syntax security notions for ABA so that it achieves above requirements. then show provably-secure constructions their implementations provide practical performance. Our promising results over typical network within second.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An extension of Transmission Power Control from one-to-one to one-to-many links

In this paper, we propose an extension to existing power control (PC) management algorithm in a multihop wireless ad hoc network. Typical power control assumes that mobile nodes communicate with each other by one-to-one. However, one-to-many style communication is necessary for energy-efficient communications of several applications where broadcast or multicast is used. In this paper, we identi...

متن کامل

Efficient many-to-one authentication with certificateless aggregate signatures

Article history: Received 1 March 2009 Received in revised form 20 November 2009 Accepted 6 April 2010 Available online 11 April 2010 Responsible Editor: R. Molva

متن کامل

Anonymous authentication for privacy-preserving IoT target-driven applications

The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical ...

متن کامل

Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices

| We propose an anonymous authentication protocol that not only allows much lower computational complexity for practical use but also meets requirements of dynamic groups, especially with power-limited devices. Our contribution is to provide the strict analysis of security based on the framework of provable security. Our protocol consists of a group manager, a veri cation center, and m group me...

متن کامل

Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting

All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[10], which uses blind signatures so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3288337