Affiliation:
1. College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China
Abstract
Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications. Without the PKI certificate and high time-complexity bilinear pairing operations, identity-based AKA (ID-AKA) protocols without pairings are more suitable for protecting the keys in IoT applications. In recent years, many pairing-free ID-AKA protocols have been proposed. Moreover, these protocols have some security flaws or relatively extensive computation and communication efficiency. Focusing on these problems, the security analyses of some recently proposed protocols have been provided first. We then proposed a family of eCK secure ID-AKA protocols without pairings to solve these security problems, which can be applied in IoT applications to guarantee communication security. Meanwhile, the security proofs of these proposed ID-AKA protocols are provided, which show they can hold provable eCK security. Some more efficient instantiations have been provided, which show the efficient performance of these proposed ID-AKA protocols. Moreover, comparisons with similar schemes have shown that these protocols have the least computation and communication efficiency at the same time.
Funder
National Natural Science Foundation of China
Key Research and Development Special Project of Henan Province
Science and Technology Program of Henan Province
Doctor Scientific Research Fund of Zhengzhou University of Light Industry
Foundation of State Key Laboratory of Public Big Data
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference41 articles.
1. Khan, M.A., Din, I.U., Majali, T.E., and Kim, B.S. (2022). A survey of authentication in Internet of things-enabled healthcare systems. Sensors, 22.
2. High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem;Jayabalasamy;J. King Saud Univ.-Comput. Inf. Sci.,2022
3. Design and implementation of an SM2-based security authentication scheme with the key agreement for smart grid communications;Li;IEEE Access,2018
4. User-friendly public-key authenticated encryption with keyword search for industrial Internet of things;Pu;IEEE Internet Things J.,2023
5. A survey on attribute-based encryption schemes suitable for the Internet of things;Rasori;IEEE Internet Things J.,2022