ECC-Based Authentication Scheme for Cloud-Based Robots

被引:8
|
作者
Jain, Saurabh [1 ]
Nandhini, C. [1 ]
Doriya, Rajesh [1 ]
机构
[1] Natl Inst Technol, Dept Informat Technol, Raipur 492010, Chhattisgarh, India
关键词
Cloud computing; Cloud robotics; Elliptic curve cryptography (ECC); Robot’ s authentication; Security; ELLIPTIC CURVE CRYPTOGRAPHY; PROTOCOL;
D O I
10.1007/s11277-020-07935-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security is one of the important aspects for many robotic applications. Cloud Robotics is one of the areas where security plays a vital role. Cloud-based robots access cloud resources to offload computational intensive tasks such as Simultaneous Localization and Mapping. Cloud-based robots can also get access to on-demand services. However, there is a strong need to provide these services secured manner. In security, authentication is one of the critical aspects because it ensures that only legitimate users get access to resources. In cloud-based robots, we intend to provide cloud services to the authorized robots only. In this paper, we have created a secure mutual authentication scheme between robots and cloud servers using Elliptic Curve Cryptography (ECC) with the key agreement for robots that access the cloud resources. The proposed scheme has been testified against the various well-known attacks using the Proverif tool. Moreover, when compared with other ECC-based authentication schemes, our proposed authentication scheme found efficient than them.
引用
收藏
页码:1557 / 1576
页数:20
相关论文
共 50 条
  • [1] ECC-Based Authentication Scheme for Cloud-Based Robots
    Saurabh Jain
    C. Nandhini
    Rajesh Doriya
    [J]. Wireless Personal Communications, 2021, 117 : 1557 - 1576
  • [2] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [3] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [4] An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
    Zhou, Yousheng
    Chen, Xinyun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [5] Under the Cloud-Based ECC Dynamic Password Authentication Scheme Design
    Gan, Hong
    Pan, Dan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 399 - 405
  • [6] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760
  • [7] ECC certificate for authentication in Cloud-based RFID
    Chaimae, Elmakfalji
    Rahal, Romadi
    Abdellatif, El Afia
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 200 - 203
  • [8] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [9] Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    Alomari, Osama Ahmad
    Alsharif, Mohammed H.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4431 - 4438
  • [10] An ECC-based enhanced and secured authentication protocol for IoT and cloud server
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (04) : 407 - 425