Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks

被引:1
|
作者
Thirunavukkarasu, V. [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
Suresh, G. [4 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, India
[4] Kings Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Elliptic curve cryptography; Internet of things; 5G wireless networks; Cloud computing; Mapping function; INTERNET; DESIGN; IOT;
D O I
10.1007/s11042-023-14539-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the technology development and need, the integration of WSN and 5G will be a key driver for successful IoT deployment. The Security issues are the major threat and challenge while integrating the WSN and 5G. Therefore here Elliptic Curve Cryptography (ECC) based flexible authentication and key management (EKAFAS) scheme is proposed in this paper to overcome the security vulnerabilities and to improve the system robustness of WSN in 5G integrated IoT. In order to provide the system with more secured, the ECC is employed for user's authentication and authorization. For the secured end to end communication user authentication and key agreement are essential. The sensors collect and process a large amount of personal information and it should be prevented from the adversaries that are able to access the private data. The secured system architecture for the integration of WSN and 5G for Internet of things is described by using the cryptanalysis algorithm. The system efficiency is determined for ECC based key agreement and flexible authentication scheme on basis of data transmission cost, computation cost, false positive rate and trust node rate. The proposed method is compared with the existing methods to measure the effectiveness.
引用
收藏
页码:21131 / 21145
页数:15
相关论文
共 50 条
  • [1] Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks
    V. Thirunavukkarasu
    A. Senthil Kumar
    P. Prakasam
    G. Suresh
    Multimedia Tools and Applications, 2023, 82 : 21131 - 21145
  • [2] Hierarchical Key Management Scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Sharmila, R.
    Shalini, R.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [3] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [4] SAKMS: A Secure Authentication and Key Management Scheme for IETF 6TiSCH Industrial Wireless Networks Based on Improved Elliptic-Curve Cryptography
    Yang, Wei
    Hou, Chengqi
    Wang, Yu
    Zhang, Zhiming
    Wang, Xinlong
    Cao, Yuanlong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 3174 - 3188
  • [5] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [6] Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography
    Namal, Suneth
    Georgantas, Konstantinos
    Gurtov, Andrei
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1830 - 1835
  • [7] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Sadhukhan, Dipanwita
    Dasgupta, Mou
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2023, 19 (03) : 231 - 246
  • [8] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Uddalak Chatterjee
    Sangram Ray
    Dipanwita Sadhukhan
    Mou Dasgupta
    Innovations in Systems and Software Engineering, 2023, 19 : 231 - 246
  • [9] A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks
    Boumerzoug, Hayette
    Bensaber, Boucif Amar
    Biskri, Ismail
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1831 - 1847
  • [10] Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context
    Bettoumi, Balkis
    Bouallegue, Ridha
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 258 - 262