共 26 条
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
被引:0
|作者:
Meshram, Chandrashekhar
[1
]
Imoize, Agbotiname Lucky
[2
,3
]
Jamal, Sajjad Shaukat
[4
]
Tambare, Parkash
[5
]
Alharbi, Adel R.
[6
]
Hussain, Iqtadar
[7
]
机构:
[1] Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, M.P., Betul,460001, India
[2] Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos,100213, Nigeria
[3] Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum,44801, Germany
[4] Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
[5] Water Resources & Applied Mathematics Research Lab, Nagpur,440027, India
[6] College of Computing and Information Technology, University of Tabuk, Tabuk,71491, Saudi Arabia
[7] Mathematics Program, Department of Mathematics. Statistics and Physics, College of Arts and Sciences, Qatar University, Doha,2713, Qatar
来源:
关键词:
Internet of things - Authentication - Hash functions - Lyapunov methods - Network architecture - Chaotic systems - Public key cryptography - Network security - Polynomials;
D O I:
暂无
中图分类号:
学科分类号:
摘要:
TheHuman-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature. © 2022 Tech Science Press. All rights reserved.
引用
收藏
页码:1373 / 1389
相关论文