Online citations, reference lists, and bibliographies.
← Back to Search

A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed IoT Applications

Pierre E. Abi-Char, Patrick Nader, Sandy Mahfouz
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Internet of Things (IoT) is growing too fast and it is being deployed in various domains such as Smart Homes, Smart City, Healthcare, etc. Security in IoT environments is critical, as information between IoT devices and end-users needs to be shared securely. Therefore, IoT systems require protecting two critical aspects, which are confidential data and identity management. However, IoT devices have many constraints, including limitations in computation, power, memory and energy. In this paper, we present a fast and secure authenticated key agreement protocol based on elliptic curve cryptography. The proposed protocol is used for distributed IoT applications. Therefore, a Trusted Third Party (TTP) is used to perform the registration phases for users and IoT devices. With respect to distributed networks, and after the registration phases are accomplished, the end-user can communicate and obtain information straightaway from the sensor nodes. The informal security of the proposed protocol is analyzed, and the analysis shows that our protocol can resist a variety of attacks. Our proposed protocol uses ECDigital Signature Algorithm (EC–DSA). It offers significantly improved performance, in terms of the required computational amount and energy usage, compared to many other authenticated protocols.
This paper references
A provably-secure ECCbased authentication scheme for wireless sensor networks
J. Nam (2014)
10.1109/ICDCSW.2012.23
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
10.1007/s10916-015-0331-2
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing
Chunzhi Wang (2015)
10.1109/ICITST.2015.7412116
Internet of things (IoT) security: Current status, challenges and prospective measures
Rwan Mahmoud (2015)
10.3390/s17071482
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
C. Li (2017)
10.1109/JSYST.2016.2544805
Anonymous Authentication for Wireless Body Area Networks With Provable Security
D. He (2017)
10.3390/s140814786
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Bruce Ndibanje (2014)
10.1109/TIFS.2015.2414399
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
Hu Xiong (2015)
10.1109/ACCESS.2019.2893918
An Unlinkable Authentication Scheme for Distributed IoT Application
Yousheng Zhou (2019)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1109/TPDS.2013.145
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
J. Liu (2014)
10.1016/j.compeleceng.2016.01.002
Secure user authentication scheme for wireless healthcare sensor networks
Chia-Hui Liu (2017)
10.1109/JIOT.2017.2714179
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
S. Roy (2018)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
10.1109/PRISMS.2014.6970594
Security and privacy in the Internet of Things: Current status and open issues
Mohamed Abomhara (2014)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1109/IEEM.2014.7058837
A taxonomy of security and privacy requirements for the Internet of Things (IoT)
Israa Alqassem (2014)
10.1007/b97644
Guide to Elliptic Curve Cryptography
D. Hankerson (2004)
10.1109/NSITNSW.2015.7176384
One time password authentication scheme based on elliptic curves for Internet of Things (IoT)
V. L. Shivraj (2015)
10.1007/s11277-016-3721-y
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
S. B. Chehelcheshmeh (2017)
10.1049/iet-ifs.2012.0058
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
C. Li (2013)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1109/JIOT.2017.2787800
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
X. Li (2018)



Semantic Scholar Logo Some data provided by SemanticScholar