ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement

被引:3
|
作者
Cherbal, Sarra [1 ]
Benchetioui, Rania [2 ]
机构
[1] Univ Setif 1, Dept Comp Sci, LRSD Lab, Setif, Algeria
[2] Univ Setif 1, Dept Comp Sci, Setif, Algeria
关键词
Internet of things; Smart-cards; Security; Mutual authentication; Key agreement; Elliptic curve cryptography; AVISPA; Scyther; SCHEME; EFFICIENT; INTERNET; LOGIC;
D O I
10.1016/j.compeleceng.2023.108759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a fast-growing trend in wireless communication where various connected objects become an everyday part of our lives. The richness of the network is leading to open challenges and exposure to various attacks. Thus, security remains a major concern. Our purpose for this paper is to propose a smart card-based protocol that enables mutual authentication between a user and a server and allows for the establishment of a secure session key. In this context, we use Elliptic curve cryptography (ECC) and other lightweight operations as hash function and exclusive OR (XOR). We perform an evaluation of our protocol using Burrows-Abadi-Needham (BAN) logic, Scyther verification tool and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results show that our solution is robust to most known attacks, suitable to IoT devices and more efficient compared to recent related protocols.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [31] A study of secure protocol for an authentication and key agreement based on Java']Java Card in IMT-2000
    Lee, JH
    Jung, MS
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 428 - 433
  • [32] Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
    Horng, Wen-Bing
    Peng, Jian-Wen
    Liu, Chao-Sheng
    Chiu, Ying-Ching
    IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
  • [33] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [35] A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Wireless Personal Communications, 2017, 96 : 813 - 832
  • [36] A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 813 - 832
  • [37] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [38] Secure password-based remote user authentication scheme against smart card security breach
    Wang, Ding
    Ma, Chun-Guang
    Zhang, Qi-Ming
    Zhao, Sendong
    Journal of Networks, 2013, 8 (01) : 148 - 155
  • [39] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [40] A Modified Remote User Authentication and Key Agreement Scheme Using Smart Cards
    Zhang, Lijiang
    Wei, Puwen
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 419 - 423