A Robust Anonymous Remote User Authentication Protocol for IoT Services

被引:0
|
作者
Ghahramani, Meysam [1 ]
Javidan, Reza [1 ]
机构
[1] Shiraz Univ Technol, Comp Engn & Informat Technol Dept, Shiraz, Iran
关键词
Key agreement; Authentication; ECC; BAN logic; Internet of things; SECURE AUTHENTICATION; RFID AUTHENTICATION; SCHEME; LIGHTWEIGHT; INTERNET; DESIGN; NETWORKS;
D O I
10.1007/s11277-021-08826-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT), as one of the hottest topics, supports resource-constrained devices which can communicate with each other at any time. Moreover, the communication must be secure on public networks, and it is sometimes necessary to control remote devices using a secure protocol. Consequently, designing a lightweight protocol is one of the challenging points to be addressed. So far, several lightweight protocols have been proposed?this paper analyzes one of the current lightweight authentication protocols for the IoT. Based on the previous protocol, a secure protocol has been suggested that inherits the benefits of the previous one, while it is completely safe against the proposed attacks. The proposed protocol fulfils mutual authentication using BAN logic, as a broadly accepted formal method in security analysis. Moreover, the proposed protocol resists well-known attacks and its security, communication overhead, and time complexity have been compared with similar protocols that show its efficiency for IoT applications. In the proposed protocol, users and IoT nodes share a secret key in 3.122 ms with 528 bytes communication overhead.
引用
收藏
页码:2347 / 2369
页数:23
相关论文
共 50 条
  • [21] A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications
    Taher, Bahaa Hussein
    Liu, Huiyu
    Abedi, Firas
    Lu, Hongwei
    Yassin, Ali A.
    Mohammed, Alzahraa J.
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [22] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    [J]. PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [23] Design of efficient anonymous identity authentication protocol for lightweight IoT devices
    Wang, Zhenyu
    Guo, Yang
    Li, Shaoqing
    Hou, Shen
    Deng, Ding
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 49 - 61
  • [25] Secure and Efficient Anonymous Authentication Protocol for Global Roaming Services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 44 - 49
  • [26] An Anonymous Authentication Protocol for Privacy Protection in Location Based Services
    Cao, Yang
    Li, Yan
    Li, Hui
    Wang, Xingfang
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4748 - 4752
  • [27] A Robust Anonymity Preserving Authentication Protocol for IoT Devices
    Tewari, Aakanksha
    Gupta, B. B.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [28] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    [J]. INTERNET OF THINGS, 2020, 9
  • [29] Robust Source Anonymous Federated Learning Shuffle Protocol in IoT
    Chen, Jingxue
    Gao, Kehan
    Zhou, Erqiang
    Qin, Zhen
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2218 - 2233
  • [30] Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction
    Taher, Bahaa Hussein
    Jiang, Sheng
    Yassin, Ali A.
    Lu, Hongwei
    [J]. IEEE ACCESS, 2019, 7 : 148950 - 148966