Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks

被引:1
|
作者
Thirunavukkarasu, V. [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
Suresh, G. [4 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, India
[4] Kings Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Elliptic curve cryptography; Internet of things; 5G wireless networks; Cloud computing; Mapping function; INTERNET; DESIGN; IOT;
D O I
10.1007/s11042-023-14539-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the technology development and need, the integration of WSN and 5G will be a key driver for successful IoT deployment. The Security issues are the major threat and challenge while integrating the WSN and 5G. Therefore here Elliptic Curve Cryptography (ECC) based flexible authentication and key management (EKAFAS) scheme is proposed in this paper to overcome the security vulnerabilities and to improve the system robustness of WSN in 5G integrated IoT. In order to provide the system with more secured, the ECC is employed for user's authentication and authorization. For the secured end to end communication user authentication and key agreement are essential. The sensors collect and process a large amount of personal information and it should be prevented from the adversaries that are able to access the private data. The secured system architecture for the integration of WSN and 5G for Internet of things is described by using the cryptanalysis algorithm. The system efficiency is determined for ECC based key agreement and flexible authentication scheme on basis of data transmission cost, computation cost, false positive rate and trust node rate. The proposed method is compared with the existing methods to measure the effectiveness.
引用
收藏
页码:21131 / 21145
页数:15
相关论文
共 50 条
  • [31] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [32] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [33] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Guoliang Liu
    Huichuan Zhang
    Fanyue Kong
    Lei Zhang
    Wireless Personal Communications, 2018, 101 : 1445 - 1455
  • [34] Design of improved password authentication and update scheme based on elliptic curve cryptography
    Islam, S. K. Hafizul
    Biswas, G. P.
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2703 - 2717
  • [35] Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
    Wang, Lili
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [36] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453
  • [37] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Liu, Guoliang
    Zhang, Huichuan
    Kong, Fanyue
    Zhang, Lei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1445 - 1455
  • [38] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [39] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [40] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Neeraj Kumar
    The Journal of Supercomputing, 2018, 74 : 6428 - 6453