Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks

被引:1
|
作者
Babu, Ch. Jayanth [1 ]
Padmavathy, R. [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Warangal 506004, Telangana, India
关键词
Quantum-secure cryptography; Internet of Things; Node-to-node authentication; Lattice-based cryptography; ISIS; Hash function; USER AUTHENTICATION; DISCRETE LOGARITHMS; SCHEME; ALGORITHMS; READER; CACHE;
D O I
10.1007/s13369-023-08242-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The infrastructure of the Internet of Things (IoT) is made up of wireless communication and sensing devices that are highly vulnerable. The authentication of the participating nodes, the confidentiality of the information transferred through an insecure channel, and access control are the major issues to be resolved in the IoT infrastructure. The security protocols used in the IoT are based on integer factorization (IF) and discrete logarithm problems (DLP), which have been proven vulnerable to quantum attacks. This paper proposes a model for a quantum-secure node-to-node authentication protocol for the Internet-of-Things (IoT) infrastructure. The protocol is modeled, and its correctness is proved formally based on the hardness of the inhomogeneous short integer solution (ISIS) problem on lattices. The security of the protocol model is verified against known attacks on the IoT infrastructure. We considered the well-known three-party protocol model to analyze the performance of the proposed model. It is analyzed for a 100-bit security level with specified security parameters. The average computation cost is computed for the number of hash functions(h(.)) and polynomial multiplication (PM) operations. The proposed model, required 2h(.) + 3PM for the IoT node,1h(.) + 2PM for the Gateway device, and in total 3h(.) + 5PM operations are needed. We also compare our protocol model to similar protocols and demonstrate that it is both computationally efficient and quantum-safe.
引用
收藏
页码:4013 / 4024
页数:12
相关论文
共 50 条
  • [31] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [32] Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications
    Porambage, Pawani
    Schmitt, Corinna
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2728 - 2733
  • [33] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [34] Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things
    Ding, Zixuan
    Xie, Qi
    SUSTAINABILITY, 2023, 15 (07)
  • [35] WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks
    Kwon, Deok Kyu
    Yu, Sung Jin
    Lee, Joon Young
    Son, Seung Hwan
    Park, Young Ho
    SENSORS, 2021, 21 (03) : 1 - 23
  • [36] Composable secure roaming authentication protocol for cloud-assisted body sensor networks
    Chang, Chin-Chen (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (18):
  • [37] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [38] An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [39] A secure n-secret based client authentication protocol for 802.11 WLANs
    Kumar, Pawan
    Kumar, Dinesh
    TELECOMMUNICATION SYSTEMS, 2020, 75 (03) : 259 - 271
  • [40] A secure n-secret based client authentication protocol for 802.11 WLANs
    Pawan Kumar
    Dinesh Kumar
    Telecommunication Systems, 2020, 75 : 259 - 271