Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks

被引:1
|
作者
Babu, Ch. Jayanth [1 ]
Padmavathy, R. [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Warangal 506004, Telangana, India
关键词
Quantum-secure cryptography; Internet of Things; Node-to-node authentication; Lattice-based cryptography; ISIS; Hash function; USER AUTHENTICATION; DISCRETE LOGARITHMS; SCHEME; ALGORITHMS; READER; CACHE;
D O I
10.1007/s13369-023-08242-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The infrastructure of the Internet of Things (IoT) is made up of wireless communication and sensing devices that are highly vulnerable. The authentication of the participating nodes, the confidentiality of the information transferred through an insecure channel, and access control are the major issues to be resolved in the IoT infrastructure. The security protocols used in the IoT are based on integer factorization (IF) and discrete logarithm problems (DLP), which have been proven vulnerable to quantum attacks. This paper proposes a model for a quantum-secure node-to-node authentication protocol for the Internet-of-Things (IoT) infrastructure. The protocol is modeled, and its correctness is proved formally based on the hardness of the inhomogeneous short integer solution (ISIS) problem on lattices. The security of the protocol model is verified against known attacks on the IoT infrastructure. We considered the well-known three-party protocol model to analyze the performance of the proposed model. It is analyzed for a 100-bit security level with specified security parameters. The average computation cost is computed for the number of hash functions(h(.)) and polynomial multiplication (PM) operations. The proposed model, required 2h(.) + 3PM for the IoT node,1h(.) + 2PM for the Gateway device, and in total 3h(.) + 5PM operations are needed. We also compare our protocol model to similar protocols and demonstrate that it is both computationally efficient and quantum-safe.
引用
收藏
页码:4013 / 4024
页数:12
相关论文
共 50 条
  • [21] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [22] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [23] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [24] Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks
    Zhou, Jiliang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [25] Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network
    Roy, Sourav
    Das, Dipnarayan
    Sen, Bibhash
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2024, 20 (01)
  • [26] Ab Initio Quantum Chemistry Study of Nitrogen Cages N2n(n=12-18)
    殷鹏刚
    赵俊芳
    关君
    高凤新
    徐文国
    Journal of Beijing Institute of Technology(English Edition), 2005, (02) : 199 - 202
  • [27] n-LQA:: n-layers query authentication in sensor networks
    Rodhe, Ioana
    Rohner, Christian
    Achtzehn, Andreas
    2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 1178 - 1183
  • [28] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [29] Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks
    Chinnaswamy, Santhanakrishnan
    Annapurani, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [30] A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion
    Wu, Fan
    Li, Xiong
    Xu, Lili
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 1120 - 1129