Affiliation:
1. School of Mathematics and Computer Science, Yunnan Minzu University, Kunming 650504, China
Abstract
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making them vulnerable to physical tampering and other security attacks. Different authentication key agreement (AKA) schemes have been used in practice; several of them do not cover the necessary security features or are incompatible with resource-constrained end devices. Their security proofs have been performed under the Random-Oracle model. We present an AKA protocol for end devices and servers. The proposal leverages the ECC-based key exchange mechanism and one-way hash function-based message authentication method to achieve mutual authentication, user anonymity, and forward security. A formal security proof of the proposed scheme is performed under the standard model and the eCK model with the elliptic curve encryption computational assumptions, and formal verification is performed with ProVerif. According to the performance comparison, it is revealed that the proposed scheme offers user anonymity, perfect forward security, and mutual authentication, and resists typical attacks such as ephemeral secret leakage attacks, impersonation attacks, man-in-the-middle attacks, and key compromise impersonation attacks. Moreover, the proposed scheme has the lowest computational and communication overhead compared to existing schemes.
Funder
Natural Science Foundation of China
Reference41 articles.
1. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications;Tedeschi;IEEE Internet Things J.,2020
2. Whitepaper, J.R. (2022, July 14). IoT The Internet of Transformation 2020. [Online]. Available online: https://www.juniperresearch.com/whitepapers/iot-the-internet-of-transformation-2020.
3. Nicanfar, H., Hosseininezhad, S., TalebiFard, P., and Leung, V.C. (2013, January 14–19). Robust privacy-preserving authentication scheme for communication between Electric Vehicle as Power Energy Storage and power stations. Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy.
4. Showkat, D., Som, S., Khatri, S.K., and Ahluwalia, A.S. (2018, January 29–31). Security Implications in IoT using Authentication and Access Control. Proceedings of the 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India.
5. Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps;Zheng;IEEE Access,2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献