ECC-Based Authentication Scheme for Cloud-Based Robots

被引:8
|
作者
Jain, Saurabh [1 ]
Nandhini, C. [1 ]
Doriya, Rajesh [1 ]
机构
[1] Natl Inst Technol, Dept Informat Technol, Raipur 492010, Chhattisgarh, India
关键词
Cloud computing; Cloud robotics; Elliptic curve cryptography (ECC); Robot’ s authentication; Security; ELLIPTIC CURVE CRYPTOGRAPHY; PROTOCOL;
D O I
10.1007/s11277-020-07935-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security is one of the important aspects for many robotic applications. Cloud Robotics is one of the areas where security plays a vital role. Cloud-based robots access cloud resources to offload computational intensive tasks such as Simultaneous Localization and Mapping. Cloud-based robots can also get access to on-demand services. However, there is a strong need to provide these services secured manner. In security, authentication is one of the critical aspects because it ensures that only legitimate users get access to resources. In cloud-based robots, we intend to provide cloud services to the authorized robots only. In this paper, we have created a secure mutual authentication scheme between robots and cloud servers using Elliptic Curve Cryptography (ECC) with the key agreement for robots that access the cloud resources. The proposed scheme has been testified against the various well-known attacks using the Proverif tool. Moreover, when compared with other ECC-based authentication schemes, our proposed authentication scheme found efficient than them.
引用
收藏
页码:1557 / 1576
页数:20
相关论文
共 50 条
  • [41] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Qingfeng Cheng
    Xinglong Zhang
    Jianfeng Ma
    [J]. Journal of Medical Systems, 2017, 41
  • [42] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    [J]. AD HOC NETWORKS, 2014, 18 : 133 - 146
  • [43] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [44] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Cheng, Qingfeng
    Zhang, Xinglong
    Ma, Jianfeng
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [45] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [46] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
  • [47] Security flaw of an ECC-based signcryption scheme with anonymity
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 4, North Jianshe Road, Chenghua District, Chengdu, Sichuan, 610054, China
    不详
    不详
    [J]. Int. J. Netw. Secur., 2013, 4 (317-320):
  • [48] Ring signature scheme for ECC-based anonymous signcryption
    Chung, Yu Fang
    Wu, Zhen Yu
    Chen, Tzer Shyong
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 669 - 674
  • [49] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175
  • [50] ECC-based new designated verifier signature scheme
    Key Lab. of Network and Information Security, College of Armed Police Force Engineering, Xi'an 710086, China
    不详
    [J]. Jiefangjun Ligong Daxue Xuebao, 2009, 3 (228-231):