Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks

被引:1
|
作者
Thirunavukkarasu, V. [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
Suresh, G. [4 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, India
[4] Kings Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Elliptic curve cryptography; Internet of things; 5G wireless networks; Cloud computing; Mapping function; INTERNET; DESIGN; IOT;
D O I
10.1007/s11042-023-14539-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the technology development and need, the integration of WSN and 5G will be a key driver for successful IoT deployment. The Security issues are the major threat and challenge while integrating the WSN and 5G. Therefore here Elliptic Curve Cryptography (ECC) based flexible authentication and key management (EKAFAS) scheme is proposed in this paper to overcome the security vulnerabilities and to improve the system robustness of WSN in 5G integrated IoT. In order to provide the system with more secured, the ECC is employed for user's authentication and authorization. For the secured end to end communication user authentication and key agreement are essential. The sensors collect and process a large amount of personal information and it should be prevented from the adversaries that are able to access the private data. The secured system architecture for the integration of WSN and 5G for Internet of things is described by using the cryptanalysis algorithm. The system efficiency is determined for ECC based key agreement and flexible authentication scheme on basis of data transmission cost, computation cost, false positive rate and trust node rate. The proposed method is compared with the existing methods to measure the effectiveness.
引用
收藏
页码:21131 / 21145
页数:15
相关论文
共 50 条
  • [11] A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Guizani, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1223 - 1229
  • [12] A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Zhi-Wei
    Chen, Shun-Der
    Lai, Yan-Ming
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 96 - 117
  • [13] A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    Chen, Huifang
    Ge, Linlin
    Xie, Lei
    SENSORS, 2015, 15 (07) : 17057 - 17075
  • [14] DEFENSE AGAINST COLLUSION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
    Cheng Hongbing Huang Xiao Yang Geng(Department of Information Engineering
    Journal of Electronics(China), 2009, 26 (05) : 651 - 658
  • [15] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [16] Mutual authentication and key agreement based on Elliptic Curve Cryptography for GSM
    Ammayappan, Kavitha
    Saxena, Ashutosh
    Negi, Atul
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 177 - +
  • [17] Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [18] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [19] A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography
    Dai, Cong
    Xu, Zhongwei
    AD HOC NETWORKS, 2022, 127
  • [20] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    Telecommunication Systems, 2021, 78 : 317 - 329