A PLS-HECC-based device authentication and key agreement scheme for smart home networks

被引:0
|
作者
Pirayesh, Jamshid [1 ]
Giaretta, Alberto [2 ]
Conti, Mauro [3 ]
Keshavarzi, Parviz [1 ]
机构
[1] Semnan University, Semnan, Iran
[2] Centre for Applied Autonomous Sensor Systems (AASS), Örebro University, Örebro, Sweden
[3] University of Padova, Padova, Italy
关键词
Authentication - Authorization - Intelligent buildings - Internet of things - Network layers - Network security - Personal communication systems;
D O I
暂无
中图分类号
学科分类号
摘要
IoT devices permeate our society, collect personal data, and support critical infrastructures such as the healthcare. Therefore, there is a critical need for authentication and authorization schemes for IoT devices to meet privacy requirements, such as mutual authentication and user anonymity, as well as robustness against security attacks. In this paper, we propose a device authentication and key agreement scheme for IoT networks. Our proposal takes as a model the scheme proposed by Rezai et al., and combines it with a physical layer security technique and a hyper-elliptic curve cryptosystem. Our results show that not only our authentication scheme provides anonymity, mutual authentication, and efficiency, but it also provides resilience to various attacks, including man-in-the-middle, replay, and de-synchronization attacks. Our comparison shows that our scheme performs better than the state-of-the-art in terms of security properties, while adding a small overhead of ≈10(ms). © 2022 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [21] A PUF-based lightweight authentication and key agreement protocol for smart UAV networks
    Zhang, Li
    Xu, Jianbo
    Obaidat, Mohammad S.
    Li, Xiong
    Vijayakumar, Pandi
    IET COMMUNICATIONS, 2022, 16 (10) : 1142 - 1159
  • [22] A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
    Rituparna Paul
    Shanvendra Rai
    Subhasish Banerjee
    Preetisudha Meher
    Peer-to-Peer Networking and Applications, 2024, 17 : 432 - 450
  • [23] A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks
    Fan, Qing
    Chen, Jianhua
    Xu, Feng
    Li, Li
    Luo, Min
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [24] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [25] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Ashish Tomar
    Sachin Tripathi
    Cluster Computing, 2022, 25 : 451 - 468
  • [26] A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
    Paul, Rituparna
    Rai, Shanvendra
    Banerjee, Subhasish
    Meher, Preetisudha
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 432 - 450
  • [27] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Tomar, Ashish
    Tripathi, Sachin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 451 - 468
  • [28] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 497 - 522
  • [29] An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards
    Li, Chun-Ta
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 517 - 520
  • [30] A Modified Remote User Authentication and Key Agreement Scheme Using Smart Cards
    Zhang, Lijiang
    Wei, Puwen
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 419 - 423