Provable Secure Anonymous Device Authentication Protocol in IoT Environment

被引:0
|
作者
Ren, Shanyao [1 ,2 ]
Liu, Yizhong [1 ]
Yu, Beiyuan [1 ]
Liu, Jianwei [1 ,2 ]
Li, Dongyu [1 ,3 ,4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Hangzhou 310051, Peoples R China
[3] Tianmushan Lab, Hangzhou 310023, Peoples R China
[4] Shanghai Inst Satellite Engn, Shanghai 201109, Peoples R China
关键词
Authentication scheme; Internet of Things (IoT) devices; real-or-random (ROR) model; KEY EXCHANGE PROTOCOL; USER AUTHENTICATION; INTERNET; NETWORKS; SCHEME;
D O I
10.1109/JIOT.2023.3332943
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inherent massive heterogeneous devices and open channels in the Internet of Things (IoT) present significant challenges for identity authentication between devices and cloud servers. For this issue, reliable protocols ensure the legality of participants and act as a crucial method to provide security for authentication. In previous research, schemes devised by researchers exhibit certain security vulnerabilities, making it challenging to withstand comprehensive network attacks, e.g., stolen device attacks, replay attacks, impersonation, etc. Additionally, some protocols have complex interaction processes, which incur significant computational redundancy and resource loss. Motivated by this, this article proposes an anonymous and certificateless lightweight authentication protocol (ACLAP) for device-to-server and device-to-device based on elliptic curve cryptography. It improves the communication quality between devices and cloud servers and solves the security risks in authentication. In the scheme, we utilize device users' passwords and biometric features as verification credentials without storing any trusted proofs on the cloud server. We address the issue of resource consumption caused by numerous devices in the IoT environment. From formal security analysis and comparisons with other works, our protocol has preferable security performance and effectively saves communication resources for authentication. Simulation results demonstrate the feasibility and practical significance of the scheme.
引用
收藏
页码:12266 / 12277
页数:12
相关论文
共 50 条
  • [1] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    [J]. SUSTAINABILITY, 2021, 13 (16)
  • [2] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    [J]. Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [3] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. 2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [4] Provable secure authentication protocol for WLAN mesh
    Cao, Chun-Jie
    Yang, Chao
    Guo, Yuan-Bo
    Ma, Jian-Feng
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2007, 37 (06): : 1354 - 1358
  • [5] Provable Secure Authentication Protocol in Fog-Enabled Smart Home Environment
    Xie, Qi
    Han, Jinming
    Ding, Zixuan
    [J]. SUSTAINABILITY, 2022, 14 (21)
  • [6] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    [J]. INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)
  • [7] A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
    Wang, Chenyu
    Xu, Guoai
    Li, Wenting
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [9] A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT
    Liu, Zhenhua
    Guo, Changbo
    Wang, Baocang
    [J]. IEEE ACCESS, 2020, 8 : 195914 - 195928
  • [10] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336