Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks

被引:0
|
作者
Naidu, Devishree [1 ,2 ]
Ray, Niranjan K. [1 ]
机构
[1] Kalinga Inst Ind Technol, Sch Comp Engn, Bhubaneswar 751024, Odisha, India
[2] Ramdeobaba Univ, Dept Comp Sci & Engn & Emerging Technol, Nagpur, Maharashtra, India
来源
关键词
EIC-EcQuV; implicit certificate; key agreement; LoRaWAN network; PKCIC; secure authentication; INTERNET;
D O I
10.1002/cpe.8283
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proposed work introduces two schemes for secure device authentication and key agreement (SDA & KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu-Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA & KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [2] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [3] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    Wireless Networks, 2023, 29 : 1333 - 1354
  • [4] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [5] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [6] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [7] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [8] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443
  • [9] A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT
    Ming, Yang
    Yang, Pengfei
    Mahdikhani, Hassan
    Lu, Rongxing
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2225 - 2236
  • [10] Secure IoT Device Authentication Scheme using Key Hiding Technology
    Kim, Byoungkoo
    Yoon, Seoungyong
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1808 - 1810