A PLS-HECC-based device authentication and key agreement scheme for smart home networks

被引:0
|
作者
Pirayesh, Jamshid [1 ]
Giaretta, Alberto [2 ]
Conti, Mauro [3 ]
Keshavarzi, Parviz [1 ]
机构
[1] Semnan University, Semnan, Iran
[2] Centre for Applied Autonomous Sensor Systems (AASS), Örebro University, Örebro, Sweden
[3] University of Padova, Padova, Italy
关键词
Authentication - Authorization - Intelligent buildings - Internet of things - Network layers - Network security - Personal communication systems;
D O I
暂无
中图分类号
学科分类号
摘要
IoT devices permeate our society, collect personal data, and support critical infrastructures such as the healthcare. Therefore, there is a critical need for authentication and authorization schemes for IoT devices to meet privacy requirements, such as mutual authentication and user anonymity, as well as robustness against security attacks. In this paper, we propose a device authentication and key agreement scheme for IoT networks. Our proposal takes as a model the scheme proposed by Rezai et al., and combines it with a physical layer security technique and a hyper-elliptic curve cryptosystem. Our results show that not only our authentication scheme provides anonymity, mutual authentication, and efficiency, but it also provides resilience to various attacks, including man-in-the-middle, replay, and de-synchronization attacks. Our comparison shows that our scheme performs better than the state-of-the-art in terms of security properties, while adding a small overhead of ≈10(ms). © 2022 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [31] Device Authentication Mechanism for Smart Energy Home Area Networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 787 - 788
  • [32] An efficient authentication and key agreement scheme for secure smart grid communication services
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [33] A cost effective mutual authentication scheme with key agreement using smart cards
    Chinese Culture University, Taiwan
    不详
    International Journal of Information and Management Sciences, 2008, 19 (04): : 571 - 587
  • [34] A secure authentication and key agreement scheme with dynamic management for vehicular networks
    Zhou, Yuxiang
    Tan, Haowen
    Iroshan, Karunarathina Chandrathilaka Appuhamilage Asiria
    CONNECTION SCIENCE, 2023, 35 (01)
  • [35] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan L.-L.
    Chang Y.
    Zhang S.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [36] A Lightweight Anonymous Authentication and Key Negotiation Scheme in Smart Home Environments
    ZUO Xinyu
    WANG Zhangang
    LI Anqian
    HUO Yuyan
    NIU Shufang
    Wuhan University Journal of Natural Sciences, 2023, 28 (06) : 523 - 530
  • [37] An Effective Device and Data Origin Authentication Scheme in Home Networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    2012 9TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2012,
  • [38] An efficient nonce-based authentication scheme with key agreement
    Chen, YC
    Yeh, LY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 982 - 994
  • [39] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
  • [40] A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    Xue, Kaiping
    Ma, Changsha
    Hong, Peilin
    Ding, Rong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 316 - 323