A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography

被引:0
|
作者
Tewari, Aakanksha [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Comp Engn Dept, Kurukshetra, Haryana, India
关键词
Authentication; Confidentiality; Elliptic Curve Cryptography; Availability; Anonymity; INTERNET; THINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is an architecture where everything can be connected to the Internet and is able to communicate with one another. Although, they are offering promising opportunities to transform our daily lives we cannot ignore the fact that they also need to he secure from threats and attacks that put our personal information at risk. Considering the lightweight architecture of the loT devices we propose a mutual authentication mechanism based on Elliptic curve cryptography (ECC) between server and the IoT device using RFID tags. ECC is a very efficient public key cryptography mechanism as it provides privacy and security with lesser computation overhead. We also present a security and performance analysis to verily the strength of our proposed approach.
引用
收藏
页码:716 / 720
页数:5
相关论文
共 50 条
  • [31] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
    Wu, Kan
    Gong, Peng
    Wang, Jiantao
    Yan, Xiaopeng
    Li, Ping
    [J]. ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335
  • [32] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [33] A robust authentication protocol for multi-server architecture using elliptic curve cryptography
    Zhang, Xueqin
    Wang, Baoping
    Zhang, Wenpeng
    [J]. International Journal of Network Security, 2019, 21 (02) : 191 - 198
  • [34] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [35] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    [J]. Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [36] Voter Authentication Using Modified Elliptic Curve Cryptography
    Sujatha, K.
    Rao, A. Arjuna
    Yejarla, Prathyusha
    Sruthi, K. J.
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 497 - 504
  • [37] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Uddalak Chatterjee
    Sangram Ray
    Dipanwita Sadhukhan
    Mou Dasgupta
    [J]. Innovations in Systems and Software Engineering, 2023, 19 : 231 - 246
  • [38] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Sadhukhan, Dipanwita
    Dasgupta, Mou
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2023, 19 (03) : 231 - 246
  • [39] An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    [J]. JOURNAL OF SENSORS, 2017, 2017
  • [40] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2016, 4 : 4394 - 4407