Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks

被引:0
|
作者
Naidu, Devishree [1 ,2 ]
Ray, Niranjan K. [1 ]
机构
[1] Kalinga Inst Ind Technol, Sch Comp Engn, Bhubaneswar 751024, Odisha, India
[2] Ramdeobaba Univ, Dept Comp Sci & Engn & Emerging Technol, Nagpur, Maharashtra, India
来源
关键词
EIC-EcQuV; implicit certificate; key agreement; LoRaWAN network; PKCIC; secure authentication; INTERNET;
D O I
10.1002/cpe.8283
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proposed work introduces two schemes for secure device authentication and key agreement (SDA & KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu-Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA & KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [22] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    ChinaCommunications, 2023, 20 (05) : 198 - 216
  • [23] Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    SENSORS, 2025, 25 (01)
  • [24] Provable secure authentication key agreement for wireless body area networks
    Ma, Yuqian
    Shi, Wenbo
    Li, Xinghua
    Cheng, Qingfeng
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (05)
  • [25] A secure authentication and key agreement scheme with dynamic management for vehicular networks
    Zhou, Yuxiang
    Tan, Haowen
    Iroshan, Karunarathina Chandrathilaka Appuhamilage Asiria
    CONNECTION SCIENCE, 2023, 35 (01)
  • [26] Provable secure authentication key agreement for wireless body area networks
    Yuqian Ma
    Wenbo Shi
    Xinghua Li
    Qingfeng Cheng
    Frontiers of Computer Science, 2024, 18
  • [27] Secure, light-weight and dynamic PUF-based mutual device authentication mechanism in industrial IoT networks
    Jain, Usha
    SECURITY AND PRIVACY, 2024, 7 (04):
  • [28] Mudscan: Double authentication based secure control mechanism for MUD enable IoT networks
    Datta, Suvrima
    Venkanna, U.
    Rao, K. Mallikharjuna
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [29] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [30] Secure LoRaWAN Root Key Update Scheme for IoT Environment
    Tsai, Kun-Lin
    Chen, Li-Woei
    Leu, Fang-Yie
    Hsu, Hsiung-Chieh
    Wu, Chuan-Tian
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 3 - 15