A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography

被引:0
|
作者
Tewari, Aakanksha [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Comp Engn Dept, Kurukshetra, Haryana, India
关键词
Authentication; Confidentiality; Elliptic Curve Cryptography; Availability; Anonymity; INTERNET; THINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is an architecture where everything can be connected to the Internet and is able to communicate with one another. Although, they are offering promising opportunities to transform our daily lives we cannot ignore the fact that they also need to he secure from threats and attacks that put our personal information at risk. Considering the lightweight architecture of the loT devices we propose a mutual authentication mechanism based on Elliptic curve cryptography (ECC) between server and the IoT device using RFID tags. ECC is a very efficient public key cryptography mechanism as it provides privacy and security with lesser computation overhead. We also present a security and performance analysis to verily the strength of our proposed approach.
引用
收藏
页码:716 / 720
页数:5
相关论文
共 50 条
  • [1] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [2] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [3] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [4] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [5] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    [J]. Journal of Medical Systems, 2015, 39
  • [6] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    [J]. Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [7] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [8] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    [J]. ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [9] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [10] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032