A Robust Anonymity Preserving Authentication Protocol for IoT Devices

被引:0
|
作者
Tewari, Aakanksha [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol, Kurukshetra, Haryana, India
关键词
INTERNET; THINGS; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In spite of being a promising technology which will make our lives a lot easier we cannot be oblivious to the fact IoT is not safe from online threat and attacks. Thus, along with the growth of IoT we also need to work on its aspects. Taking into account the limited resources that these devices have it is important that the security mechanisms should also be less complex and do not hinder the actual functionality of the device. In this paper, we propose an ECC based lightweight authentication for IoT devices which deploy RFID tags at the physical layer. ECC is a very efficient public key cryptography mechanism as it provides privacy and security with lesser computation overhead. We also present a security and performance analysis to verify the strength of our proposed approach.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
    Chen, Chien-Ming
    Liu, Shuangshuang
    Chaudhry, Shehzad Ashraf
    Chen, Yeh-Cheng
    Khan, Muhammad Asghar
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (01): : 307 - 329
  • [2] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [3] A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
    He, Daojing
    Cai, Yanchang
    Zhu, Shanshan
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) : 7862 - 7872
  • [4] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [5] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [6] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [7] Authentication and Trustful Communication Protocol for IoT Devices
    Kobayashi, Seiya
    Miyazaki, Toshiaki
    [J]. PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [8] A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
    Wang, Zhiwei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 342 - 348
  • [9] Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity
    Wang, Huawei
    Guo, Dianli
    Zhang, Hua
    Wen, Qiaoyan
    [J]. SENSORS, 2019, 19 (14)
  • [10] A robust ECC based mutual authentication protocol with anonymity for session initiation protocol
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Li, Linsen
    Alzahrani, Bander
    [J]. PLOS ONE, 2017, 12 (10):