Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks

被引:1
|
作者
Thirunavukkarasu, V. [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
Suresh, G. [4 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, India
[4] Kings Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Elliptic curve cryptography; Internet of things; 5G wireless networks; Cloud computing; Mapping function; INTERNET; DESIGN; IOT;
D O I
10.1007/s11042-023-14539-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the technology development and need, the integration of WSN and 5G will be a key driver for successful IoT deployment. The Security issues are the major threat and challenge while integrating the WSN and 5G. Therefore here Elliptic Curve Cryptography (ECC) based flexible authentication and key management (EKAFAS) scheme is proposed in this paper to overcome the security vulnerabilities and to improve the system robustness of WSN in 5G integrated IoT. In order to provide the system with more secured, the ECC is employed for user's authentication and authorization. For the secured end to end communication user authentication and key agreement are essential. The sensors collect and process a large amount of personal information and it should be prevented from the adversaries that are able to access the private data. The secured system architecture for the integration of WSN and 5G for Internet of things is described by using the cryptanalysis algorithm. The system efficiency is determined for ECC based key agreement and flexible authentication scheme on basis of data transmission cost, computation cost, false positive rate and trust node rate. The proposed method is compared with the existing methods to measure the effectiveness.
引用
收藏
页码:21131 / 21145
页数:15
相关论文
共 50 条
  • [21] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329
  • [22] Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
    Kasyoka, Philemon
    Kimwele, Michael
    Angolo, Shem Mbandu
    ENGINEERING REPORTS, 2020, 2 (07)
  • [23] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Huang, Baojun
    Khan, Muhammad Khurram
    Wu, Libing
    Bin Muhaya, Fahad T.
    He, Debiao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 225 - 240
  • [24] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Baojun Huang
    Muhammad Khurram Khan
    Libing Wu
    Fahad T. Bin Muhaya
    Debiao He
    Wireless Personal Communications, 2015, 85 : 225 - 240
  • [25] An improved authentication key agreement protocol based on elliptic curve for wireless mobile networks
    Chang, Chin-Chen
    Chang, Shih-Chang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1375 - 1378
  • [26] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [27] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [28] An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
    Oladipupo, Esau Taiwo
    Abikoye, Oluwakemi Christiana
    Imoize, Agbotiname Lucky
    Awotunde, Joseph Bamidele
    Chang, Ting-Yi
    Lee, Cheng-Chi
    Do, Dinh-Thuan
    IEEE ACCESS, 2023, 11 : 1306 - 1323
  • [29] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [30] An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Kumari, Saru
    Li, Xiong
    Sangaiah, Arun Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 : 557 - 565