Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks

被引:1
|
作者
Thirunavukkarasu, V. [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
Suresh, G. [4 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, India
[4] Kings Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Elliptic curve cryptography; Internet of things; 5G wireless networks; Cloud computing; Mapping function; INTERNET; DESIGN; IOT;
D O I
10.1007/s11042-023-14539-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the technology development and need, the integration of WSN and 5G will be a key driver for successful IoT deployment. The Security issues are the major threat and challenge while integrating the WSN and 5G. Therefore here Elliptic Curve Cryptography (ECC) based flexible authentication and key management (EKAFAS) scheme is proposed in this paper to overcome the security vulnerabilities and to improve the system robustness of WSN in 5G integrated IoT. In order to provide the system with more secured, the ECC is employed for user's authentication and authorization. For the secured end to end communication user authentication and key agreement are essential. The sensors collect and process a large amount of personal information and it should be prevented from the adversaries that are able to access the private data. The secured system architecture for the integration of WSN and 5G for Internet of things is described by using the cryptanalysis algorithm. The system efficiency is determined for ECC based key agreement and flexible authentication scheme on basis of data transmission cost, computation cost, false positive rate and trust node rate. The proposed method is compared with the existing methods to measure the effectiveness.
引用
收藏
页码:21131 / 21145
页数:15
相关论文
共 50 条
  • [41] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [42] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [44] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Qi, Mingping
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 23335 - 23351
  • [45] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Mingping Qi
    Jianhua Chen
    Multimedia Tools and Applications, 2018, 77 : 23335 - 23351
  • [46] 5G Authentication and Key Management for Applications
    Huang, Xiaoting
    Tsiatsis, Vlasios
    Palanigounder, Anand
    Su, Li
    Yang, Bo
    IEEE Communications Standards Magazine, 2021, 5 (02): : 142 - 148
  • [47] Key management based on elliptic curve Paillier scheme in ad hoc networks
    Wang, Huaqun
    Zhao, Shuping
    Jiang, Guoxing
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 116 - +
  • [48] A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography
    Alshudukhi, Jalawi Sulaiman
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    IEEE ACCESS, 2021, 9 : 15633 - 15642
  • [49] Smart card authentication model based on elliptic curve cryptography in IoT networks
    Joy, A. Shakeela
    Ravi, R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) : 548 - 569
  • [50] Security approaches based on elliptic curve cryptography in wireless sensor networks
    Salah, Mohammed Said
    Maizate, Abderrahim
    Ouzzif, Mohammed
    2015 27TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2015, : 35 - 38