User security authentication protocol in multi gateway scenarios of the Internet of Things

被引:2
|
作者
Zhao, Junhui [1 ,2 ]
Huang, Fanwei [1 ]
Hu, Huanhuan [1 ]
Liao, Longxia [1 ]
Wang, Dongming [3 ]
Fan, Lisheng [4 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engn, Nanchang 330013, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[3] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 11078, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Secure authentication protocols; Internet of Things; Multiple gateways; KEY AGREEMENT; SCHEME;
D O I
10.1016/j.adhoc.2024.103427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G technology has been applied and popularized, leading to the widespread usage of the Internet of Things (IoT) in various areas such as intelligent transportation, home security, fire protection, industrial monitoring, healthcare, and data collection intelligence. Data sharing is one of the key factors for successful application in these fields. However, real-time data sharing through open channels may result in transmitted messages being illegally accessed by attackers, leading to privacy breaches. At present, most existing authentication schemes focus on single gateway authentication models. In order to overcome issues such as elevated communication overhead, reduced network performance, and inefficient cross -domain access in the single gateway model with larger network sizes, we introduce a multi -gateway lightweight authentication scheme as a solution. Firstly, our scheme is based on a three -factor authentication scheme of Chebyshev chaotic mapping, hash function, and XOR operation. This scheme achieves secure authentication between sensor nodes and users, establishes session keys, and also supports user key updates. Secondly, through security analysis, we demonstrate that the proposed scheme resists internal disguise attacks, sensor capture attacks, temporary secret leakage attacks, and achieves forward security of session keys. We additionally provide a demonstration of the semantic security of session keys by utilizing a Random Oracle Model (ROM). Finally, compared to other schemes, the results show that our proposed scheme has lower communication overhead and computational resource requirements, and is more in line with the requirements of lightweight device security authentication in the IoT.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Secure Multi-protocol Gateway for Internet of Things
    Amiruddin, Amiruddin
    Ratna, Anak Agung Putri
    Harwahyu, Ruki
    Sari, Riri Fitri
    [J]. 2018 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2018,
  • [2] A Quantum-Safe User Authentication Protocol for the Internet of Things
    Roy, Kumar Sekhar
    Kalita, Hemanta Kumar
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2019, 10 (03): : 178 - 192
  • [3] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [4] Design and Implementation of Multi-Protocol Gateway for Internet of Things
    Hanggoro, Delphi
    Rosyidi, Lukman
    Sari, Riri Fitri
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY (IAICT), 2019, : 64 - 69
  • [5] Multi Factor User Authentication Mechanism using Internet of things
    Rao, M. Kameswara
    Santhi, S. G.
    Hussain, Md Ali
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [6] A multi-device user authentication mechanism for Internet of Things
    Eman, Raihan Dewon
    Jahan, Mosarrat
    Kabir, Upama
    [J]. IET NETWORKS, 2023, 12 (05) : 229 - 249
  • [7] Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
    Zhao, Junhui
    Hu, Huanhuan
    Huang, Fanwei
    Guo, Yingxuan
    Liao, Longxia
    [J]. ELECTRONICS, 2023, 12 (08)
  • [8] Security of a New Lightweight Authentication and Key Agreement Protocol for Internet of Things
    Fan, Xiaohong
    Niu, Baoli
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 107 - 111
  • [9] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Nikravan, Mohammad
    Reza, Akram
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (01) : 463 - 494
  • [10] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Mohammad Nikravan
    Akram Reza
    [J]. Wireless Personal Communications, 2020, 111 : 463 - 494