An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

被引:0
|
作者
Meshram, Chandrashekhar [1 ]
Imoize, Agbotiname Lucky [2 ,3 ]
Jamal, Sajjad Shaukat [4 ]
Tambare, Parkash [5 ]
Alharbi, Adel R. [6 ]
Hussain, Iqtadar [7 ]
机构
[1] Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, M.P., Betul,460001, India
[2] Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos,100213, Nigeria
[3] Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum,44801, Germany
[4] Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
[5] Water Resources & Applied Mathematics Research Lab, Nagpur,440027, India
[6] College of Computing and Information Technology, University of Tabuk, Tabuk,71491, Saudi Arabia
[7] Mathematics Program, Department of Mathematics. Statistics and Physics, College of Arts and Sciences, Qatar University, Doha,2713, Qatar
来源
Computers, Materials and Continua | 2022年 / 72卷 / 01期
关键词
Internet of things - Authentication - Hash functions - Lyapunov methods - Network architecture - Chaotic systems - Public key cryptography - Network security - Polynomials;
D O I
暂无
中图分类号
学科分类号
摘要
TheHuman-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature. © 2022 Tech Science Press. All rights reserved.
引用
收藏
页码:1373 / 1389
相关论文
共 26 条
  • [1] An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Jamal, Sajjad Shaukat
    Tambare, Parkash
    Alharbi, Adel R.
    Hussain, Iqtadar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1373 - 1389
  • [2] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Yanrong Lu
    Guangquan Xu
    Lixiang Li
    Yixian Yang
    Wireless Networks, 2019, 25 : 1461 - 1475
  • [3] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    WIRELESS NETWORKS, 2019, 25 (04) : 1461 - 1475
  • [4] A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment
    Xia, Meichen
    Li, Shiliang
    Liu, Liu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1673 - 1689
  • [5] A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
    Alavalapati Goutham Reddy
    Ashok Kumar Das
    Vanga Odelu
    Awais Ahmad
    Ji Sun Shin
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 661 - 680
  • [6] A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT
    Xue, Lingyan
    Huang, Qinglong
    Zhang, Shuaiqing
    Huang, Haiping
    Wang, Wenming
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps
    Hu, Jiaxi
    Xu, Zhiqiang
    He, Debiao
    Zeadally, Sherali
    Choo, Kim-Kwang Raymond
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 186 - 202
  • [8] A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Odelu, Vanga
    Ahmad, Awais
    Shin, Ji Sun
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 661 - 680
  • [9] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Han, Lidong
    Tan, Xiao
    Wang, Shengbao
    Liang, Xikun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 63 - 73
  • [10] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Lidong Han
    Xiao Tan
    Shengbao Wang
    Xikun Liang
    Peer-to-Peer Networking and Applications, 2018, 11 : 63 - 73