ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement

被引:3
|
作者
Cherbal, Sarra [1 ]
Benchetioui, Rania [2 ]
机构
[1] Univ Setif 1, Dept Comp Sci, LRSD Lab, Setif, Algeria
[2] Univ Setif 1, Dept Comp Sci, Setif, Algeria
关键词
Internet of things; Smart-cards; Security; Mutual authentication; Key agreement; Elliptic curve cryptography; AVISPA; Scyther; SCHEME; EFFICIENT; INTERNET; LOGIC;
D O I
10.1016/j.compeleceng.2023.108759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a fast-growing trend in wireless communication where various connected objects become an everyday part of our lives. The richness of the network is leading to open challenges and exposure to various attacks. Thus, security remains a major concern. Our purpose for this paper is to propose a smart card-based protocol that enables mutual authentication between a user and a server and allows for the establishment of a secure session key. In this context, we use Elliptic curve cryptography (ECC) and other lightweight operations as hash function and exclusive OR (XOR). We perform an evaluation of our protocol using Burrows-Abadi-Needham (BAN) logic, Scyther verification tool and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results show that our solution is robust to most known attacks, suitable to IoT devices and more efficient compared to recent related protocols.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [1] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [2] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [3] Performance analysis of smart card-based fingerprint recognition for secure user authentication
    Gil, YH
    Chung, YW
    Dosung, A
    Moon, JH
    Kim, HK
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 87 - 96
  • [4] A robust smart card-based anonymous user authentication protocol for wireless communications
    Wen, Fengtong
    Susilo, Willy
    Yang, Guomin
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 987 - 993
  • [5] A provably secure smart card-based authenticated group key exchange protocol
    Chang, Chin-Chen
    Le, Hai-Duong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1602 - 1607
  • [6] Smart card-based secure authentication protocol in multi-server IoT environment
    Won-il Bae
    Jin Kwak
    Multimedia Tools and Applications, 2020, 79 : 15793 - 15811
  • [7] Smart card-based secure authentication protocol in multi-server IoT environment
    Bae, Won-il
    Kwak, Jin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 15793 - 15811
  • [8] A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
    Sahu, Ajay Kumar
    Kumar, Ashish
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 395 - 410
  • [9] Smart card-based password authenticated key agreement protocol using chaotic maps
    Cheng, Ting-Fang
    Chang, Chin-Chen
    Lo, Yu-Ya
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [10] Cryptanalysis of a smart card-based remote authentication scheme with anonymity
    School of Computer Science and Technology, Huazhong University of Science and Technology, Hongshan Distract, Wuhan City, Hubei
    430074, China
    J. Comput. Theor. Nanosci., 11 (4778-4784):