An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

被引:0
|
作者
Meshram, Chandrashekhar [1 ]
Imoize, Agbotiname Lucky [2 ,3 ]
Jamal, Sajjad Shaukat [4 ]
Tambare, Parkash [5 ]
Alharbi, Adel R. [6 ]
Hussain, Iqtadar [7 ]
机构
[1] Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, M.P., Betul,460001, India
[2] Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos,100213, Nigeria
[3] Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum,44801, Germany
[4] Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
[5] Water Resources & Applied Mathematics Research Lab, Nagpur,440027, India
[6] College of Computing and Information Technology, University of Tabuk, Tabuk,71491, Saudi Arabia
[7] Mathematics Program, Department of Mathematics. Statistics and Physics, College of Arts and Sciences, Qatar University, Doha,2713, Qatar
来源
Computers, Materials and Continua | 2022年 / 72卷 / 01期
关键词
Internet of things - Authentication - Hash functions - Lyapunov methods - Network architecture - Chaotic systems - Public key cryptography - Network security - Polynomials;
D O I
暂无
中图分类号
学科分类号
摘要
TheHuman-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature. © 2022 Tech Science Press. All rights reserved.
引用
收藏
页码:1373 / 1389
相关论文
共 26 条
  • [21] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Xu, Tao
    Xu, Cheng
    Xu, Zisang
    CHINA COMMUNICATIONS, 2021, 18 (12) : 315 - 331
  • [22] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Tao Xu
    Cheng Xu
    Zisang Xu
    China Communications, 2021, 18 (12) : 315 - 331
  • [23] An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    Kumari, Saru
    Odelu, Vanga
    Wazid, Mohammad
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2070 - 2092
  • [24] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [25] An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS
    Gaikwad, Vishesh P.
    Tembhurne, Jitendra, V
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    IEEE ACCESS, 2021, 9 : 108586 - 108600
  • [26] An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card
    Karthigaiveni, M.
    Indrani, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019,