Incremental Threshold Scheme Enabled IoT Group Key Management

Mingyan Li, Samuel C. Hollifield, Michael D. Iannacone

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cyber landscape evolves rapidly. Internet of Things (IoT) and Edge Computing (EC) have rapidly become an integral part of the modern computing infrastructure. It is expected that there will be more than 50 billion active and connected IoT devices by 2025 [1]. Pervasive IoT/EC creates unprecedented opportunities bridging the gap between previously segregated cyber and physical spaces. However, this progress also brings along new security challenges. IoT devices typically have limited computation, communication, and storage resources. This leads to security architecture designs such as using symmetric keys for group communication. While secure and efficient in stable network settings, symmetric key solutions are ill-adapted for IoT's highly dynamic device mobility behavior and frequent group membership turnover. Whenever IoT members leave a group, the known symmetric keys cannot be made forgotten, posing a serious vulnerability. This leads to frequent re-groupings that require expensive re-authentication, key regeneration, and key redistribution in order to maintain IoT/EC security. We present a novel symmetric key management framework that integrate an Incremental Threshold Scheme (ITS) cryptographical function into communication protocol's key rotation mechanism to allow for secure and efficient symmetric key communication group member node revocation. This ITS-enabled key management framework alleviates the need of frequent and expensive re-grouping and re-keying needed by today's large and dynamic IoT/EC operations. We further applied this ITS-enabled key management framework to a distributed IoT/EC-integrated publish and subscribe framework for applicability validation.

Original languageEnglish
Title of host publication2023 7th Cyber Security in Networking Conference, CSNet 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages123-129
Number of pages7
ISBN (Electronic)9798350342871
DOIs
StatePublished - 2023
Event7th Cyber Security in Networking Conference, CSNet 2023 - Montreal, Canada
Duration: Oct 16 2023Oct 18 2023

Publication series

Name2023 7th Cyber Security in Networking Conference, CSNet 2023

Conference

Conference7th Cyber Security in Networking Conference, CSNet 2023
Country/TerritoryCanada
CityMontreal
Period10/16/2310/18/23

Funding

This manuscript has been co-authored by UT-Battelle, LLC, under contract DEAC05-00OR22725 with the US Department of Energy (DOE). The US government retains and the publisher, by accepting the article for publication, acknowledges that the US government retains a nonexclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for US government purposes. DOE will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan).

Keywords

  • IoT security
  • group key management
  • secret sharing scheme
  • secure Pub/Sub
  • secure group communication
  • threshold cryptography

Fingerprint

Dive into the research topics of 'Incremental Threshold Scheme Enabled IoT Group Key Management'. Together they form a unique fingerprint.

Cite this