The integration of Contributory Group Key Agreement (CGKA) for group formation revolutionizes the collaborative process of generating group keys, instilling trust and fostering collaboration among group members. By ensuring that each member actively contributes to the generation of the group key, CGKA distributes the responsibility of key generation across the group, thereby enhancing the security and resilience of the group's cryptographic infrastructure. Concurrently, the utilization of Lattice Diffie-Hellman (LDH) for key generation leverages the mathematical properties of lattices to securely derive shared secret keys. LDH offers a robust and efficient method for generating keys in cryptographic applications, ensuring the confidentiality and integrity of communication channels. Furthermore, the incorporation of blockchain technology for implementing membership changes introduces a decentralized and transparent approach to managing group membership dynamics. By leveraging blockchain's distributed ledger technology and smart contracts, membership changes can be executed securely, transparently, and efficiently. This enhances the integrity and resilience of the group's membership management system, allowing for the secure addition and removal of members from the group while maintaining the integrity of the cryptographic infrastructure. Together, the integration of CGKA, LDH, and blockchain technology presents a comprehensive solution for advancing the security and scalability of dynamic group membership management protocols, offering a robust framework for secure and efficient communication in contemporary environments. Moreover, the proposed integration of CGKA, LDH, and blockchain technology facilitates seamless adaptation to dynamic changes in group membership, ensuring that security and scalability are maintained even as the composition of the group evolves. Through simulations and performance evaluations, the effectiveness of the integrated approach that is implemented in Python Software is demonstrated compared to existing protocols like Elliptic Curve Diffie-Hellman (ECDH), RSA Key Exchange, and Post-Quantum Cryptography (PQC).
Keywords
Contributory Group Key Agreement, Lattice Diffie-Hellman, Blockchain, Group Membership Management, Security.
J. I. Escribano Pablos and M. I. González Vasco, “Secure post‐quantum group key exchange: Implementing a solution based on Kyber,” IET Communications, vol. 17, no. 6, pp. 758–773, Jan. 2023, doi: 10.1049/cmu2.12561.
Z. Ashraf, A. Sohail, and M. Yousaf, “Robust and lightweight symmetric key exchange algorithm for next-generation IoE,” Internet of Things, vol. 22, p. 100703, Jul. 2023, doi: 10.1016/j.iot.2023.100703.
K. Seyhan, T. N. Nguyen, S. Akleylek, K. Cengiz, and S. K. H. Islam, “Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security,” Journal of Information Security and Applications, vol. 58, p. 102788, May 2021, doi: 10.1016/j.jisa.2021.102788.
A. Musuroi, B. Groza, L. Popa, and P.-S. Murvay, “Fast and Efficient Group Key Exchange in Controller Area Networks (CAN),” IEEE Transactions on Vehicular Technology, vol. 70, no. 9, pp. 9385–9399, Sep. 2021, doi: 10.1109/tvt.2021.3098546.
C. Gupta and N. V. Subba Reddy, “Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.,” Journal of Physics: Conference Series, vol. 2161, no. 1, p. 012014, Jan. 2022, doi: 10.1088/1742-6596/2161/1/012014.
D. S. Gupta, S. Ray, T. Singh, and M. Kumari, “Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security,” Computer Communications, vol. 181, pp. 69–79, Jan. 2022, doi: 10.1016/j.comcom.2021.09.031.
Y. Zheng, W. Liu, C. Gu, and C.-H. Chang, “PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 4, pp. 3299–3316, Jul. 2023, doi: 10.1109/tdsc.2022.3193570.
Q. Fan, J. Chen, M. Shojafar, S. Kumari, and D. He, “SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6424–6434, Sep. 2022, doi: 10.1109/tii.2022.3145584.
H. Gu and M. Potkonjak, “Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF,” Proceedings of the International Symposium on Low Power Electronics and Design, pp. 1–6, Jul. 2018, doi: 10.1145/3218603.3218646.
N. K, “Performance Evaluation of Fog Computing for Latency and Energy Efficiency in IoT Applications,” Journal of Computer and Communication Networks, pp. 22–32, Feb. 2025, doi: 10.64026/jccn/2025003.
A. Triantafyllou, P. Sarigiannidis, and T. D. Lagkas, “Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends,” Wireless Communications and Mobile Computing, vol. 2018, no. 1, Jan. 2018, doi: 10.1155/2018/5349894.
V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommunication Systems, vol. 67, no. 3, pp. 423–441, Jun. 2017, doi: 10.1007/s11235-017-0345-9.
“Security and Privacy Issues in Internet of Medical Things,” 2023, doi: 10.1016/c2020-0-03339-6.
J. Karlsson, L. S. Dooley, and G. Pulkkis, “Secure Routing for MANET Connected Internet of Things Systems,” 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 114–119, Aug. 2018, doi: 10.1109/ficloud.2018.00024.
Y. B. Zikria, H. Yu, M. K. Afzal, M. H. Rehmani, and O. Hahm, “Internet of Things (IoT): Operating System, Applications and Protocols Design, and Validation Techniques,” Future Generation Computer Systems, vol. 88, pp. 699–706, Nov. 2018, doi: 10.1016/j.future.2018.07.058.
A. Čolaković and M. Hadžialić, “Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues,” Computer Networks, vol. 144, pp. 17–39, Oct. 2018, doi: 10.1016/j.comnet.2018.07.017.
Y. Cui, Y. Ma, Z. Zhao, Y. Li, W. Liu, and W. Shu, “Research on data fusion algorithm and anti-collision algorithm based on internet of things,” Future Generation Computer Systems, vol. 85, pp. 107–115, Aug. 2018, doi: 10.1016/j.future.2018.03.016.
G. Avoine, S. Canard, and L. Ferreira, “Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy,” Topics in Cryptology – CT-RSA 2020, pp. 199–224, 2020, doi: 10.1007/978-3-030-40186-3_10.
C. Patel and N. Doshi, “Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm,” IEEE Transactions on Computers, vol. 70, no. 11, pp. 1789–1803, Nov. 2021, doi: 10.1109/tc.2020.3026027.
H. Davis and F. Günther, “Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols,” Applied Cryptography and Network Security, pp. 448–479, 2021, doi: 10.1007/978-3-030-78375-4_18.
A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Corrections to ‘ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs’ [Mar 21 1663-1678],” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1945–1945, Mar. 2021, doi: 10.1109/tits.2020.3029936.
S.-P. Lu, C.-L. Lei, C.-Y. Ho, S.-S. Hwang, and H.-C. Chen, “Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network,” IEEE Access, vol. 10, pp. 92006–92022, 2022, doi: 10.1109/access.2022.3199880.
M. Dammak, S.-M. Senouci, M. A. Messous, M. H. Elhdhili, and C. Gransart, “Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments,” IEEE Transactions on Network and Service Management, vol. 17, no. 3, pp. 1742–1757, Sep. 2020, doi: 10.1109/tnsm.2020.3002957.
W. Li, C. Feng, L. Zhang, H. Xu, B. Cao, and M. A. Imran, “A Scalable Multi-Layer PBFT Consensus for Blockchain,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1146–1160, May 2021, doi: 10.1109/tpds.2020.3042392.
S. Urooj, S. Lata, S. Ahmad, S. Mehfuz, and S. Kalathil, “Cryptographic Data Security for Reliable Wireless Sensor Network,” Alexandria Engineering Journal, vol. 72, pp. 37–50, Jun. 2023, doi: 10.1016/j.aej.2023.03.061.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Renisha P S and Bhawana Rudra;
Methodology: Renisha P S;
Software: Bhawana Rudra;
Data Curation: Renisha P S;
Writing- Original Draft Preparation: Renisha P S and Bhawana Rudra;
Visualization: Renisha P S;
Investigation: Bhawana Rudra;
Supervision: Renisha P S;
Validation: Bhawana Rudra;
Writing- Reviewing and Editing: Renisha P S and Bhawana Rudra;All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Author(s) thanks to Dr.Bhawana Rudra for this research completion and support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Renisha P S
Department of Information Technology, National Institute of Technology, Surathkal, Karnataka, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Renisha P S and Bhawana Rudra, “Advancing Security and Scalability - A Protocol Extension for Dynamic Group Membership Management”, Journal of Machine and Computing, vol.5, no.3, pp. 1931-1943, July 2025, doi: 10.53759/7669/jmc202505151.