scholarly journals Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments

Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3534 ◽  
Author(s):  
Dae-Hwi Lee ◽  
Im-Yeong Lee

The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing attention. Smart cities represent the ultimate convergence of the IoT, the Cloud, big data, and mobile technology. Smart homes, buildings, and factories create smart cities. In addition, the IoT finds applications in traffic control, public safety, and medical services, permitting group-based communication. As the scale of service grows, the number of things (devices) constituting the service also increases. However, security vulnerabilities arise in group-based communication environments. A device may require authentication when entering a gateway; to secure environments with large numbers of devices (such as those featuring IoT smart metering), the gateways bear heavy loads. Therefore, efficient authentication of group leaders and devices is essential. Here, we develop a dynamic group authentication and key exchange scheme for group-based IoT smart metering environments which enables efficient communication among secure IoT services. Our group authentication scheme increases the computational efficiency of the group leader and the participating devices, based on a threshold secret sharing technique.

2021 ◽  
Author(s):  
Biswajit Paul ◽  
Rajesh Palit

Advanced-Metering-Infrastructure (AMI) is an integral part of Smart-Grids (SGs). It enables accurate consumer billing in presence of dynamic pricing, and improves efficiency and reliability of electricity distribution in presence of distributed generation. Value-added features of AMI such as diagnostics and maintenance service can identify the anomalous power consumption patterns of appliances at the end of their life cycle. Water and gas utility distribution networks in smart cities will incorporate AMI as an application of Internet-of-Things (IoT). The communication infrastructure plays a crucial role in enabling two-way communication between Smart-Meters (SMs) and the utility. AMI’s bi-directional communication facility supports precise modeling of load information and data management system facilitating demand-response applications to reduce energy wastage. Researchers have investigated the role of wireless technologies in Home-Area-Networks (HANs), Neighborhood-Area-Networks (NANs) and Wide-Area-Networks (WANs) in AMI. The arrival of new Low-Power-Wide-Area-Networks (LPWANs) technologies has opened up new technology integration possibilities in AMI. However, it is essential to understand the AMI architecture, envisioned application types, network requirements, features and limitations of existing technologies to determine a technology’s integration suitability in an application for smart metering technology. This chapter discusses LoRa for smart metering in infrastructure-less environments and the possible use of our multi-hop routing scheme.


2021 ◽  
Vol 140 ◽  
pp. 110755
Author(s):  
Hakpyeong Kim ◽  
Heeju Choi ◽  
Hyuna Kang ◽  
Jongbaek An ◽  
Seungkeun Yeom ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3658
Author(s):  
Qingfeng Zhu ◽  
Sai Ji ◽  
Jian Shen ◽  
Yongjun Ren

With the advanced development of the intelligent transportation system, vehicular ad hoc networks have been observed as an excellent technology for the development of intelligent traffic management in smart cities. Recently, researchers and industries have paid great attention to the smart road-tolling system. However, it is still a challenging task to ensure geographical location privacy of vehicles and prevent improper behavior of drivers at the same time. In this paper, a reliable road-tolling system with trustworthiness evaluation is proposed, which guarantees that vehicle location privacy is secure and prevents malicious vehicles from tolling violations at the same time. Vehicle route privacy information is encrypted and uploaded to nearby roadside units, which then forward it to the traffic control center for tolling. The traffic control center can compare data collected by roadside units and video surveillance cameras to analyze whether malicious vehicles have behaved incorrectly. Moreover, a trustworthiness evaluation is applied to comprehensively evaluate the multiple attributes of the vehicle to prevent improper behavior. Finally, security analysis and experimental simulation results show that the proposed scheme has better robustness compared with existing approaches.


2011 ◽  
Vol 130-134 ◽  
pp. 291-294
Author(s):  
Guang Liang Liu ◽  
Sheng Xian Xie ◽  
Wei Fu

On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme.In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better .can prevent a malicious user's forgery attack and have the security properties of proxy signature.


2021 ◽  
pp. 102986
Author(s):  
M. Mazhar Rathore ◽  
Anand Paul ◽  
Seungmin Rho ◽  
Murad Khan ◽  
S. Vimal ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document