Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices
نویسندگان
چکیده
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) manager broadcasts information devices, e.g., wireless environment, only the designated devices can identify operations sent from manager; 2) each device detect (malicious) manipulation of broadcast hence prevents maliciously generated being executed. In this paper, introduce anonymous authentication (ABA) as core cryptographic primitive remote-control system. formally define syntax security notions for ABA so that it achieves above requirements. then show provably-secure constructions their implementations provide practical performance. Our promising results over typical network within second.
منابع مشابه
An extension of Transmission Power Control from one-to-one to one-to-many links
In this paper, we propose an extension to existing power control (PC) management algorithm in a multihop wireless ad hoc network. Typical power control assumes that mobile nodes communicate with each other by one-to-one. However, one-to-many style communication is necessary for energy-efficient communications of several applications where broadcast or multicast is used. In this paper, we identi...
متن کاملEfficient many-to-one authentication with certificateless aggregate signatures
Article history: Received 1 March 2009 Received in revised form 20 November 2009 Accepted 6 April 2010 Available online 11 April 2010 Responsible Editor: R. Molva
متن کاملAnonymous authentication for privacy-preserving IoT target-driven applications
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical ...
متن کاملAnonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices
| We propose an anonymous authentication protocol that not only allows much lower computational complexity for practical use but also meets requirements of dynamic groups, especially with power-limited devices. Our contribution is to provide the strict analysis of security based on the framework of provable security. Our protocol consists of a group manager, a veri cation center, and m group me...
متن کاملAnonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting
All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[10], which uses blind signatures so...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3288337