A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things

被引:19
|
作者
Ding, Xuyang [1 ]
Wang, Xiaoxiang [1 ]
Xie, Ying [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Southwest Minzu Univ, Sch Comp Sci & Engn, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Protocols; Internet of Things; Elliptic curve cryptography; Privacy; Smart meters; Anonymous authentication; Internet of Things (IoT) security; privacy protection; resource-constrained devices; SCHEME; TECHNOLOGIES; CHALLENGES; NETWORKS;
D O I
10.1109/JIOT.2021.3088641
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) in recent years, the security of IoT becomes more and more prominent. To protect data privacy and device availability, identity authentication technology has been applied to the IoT environment. However, although scholars have designed a variety of authentication protocols for the IoT environment, the resource costs of these protocols are still expensive for resource-constrained devices. In particular, when the frequent upgrade of computer hardware has led to a gradual increase in the key length of the cryptosystem, IoT devices are hard to keep up with the upgrade speed because of the balance between cost and tasks. Although the storage space has increased in recent years, the computational and communication capabilities are still limited by some physical factors, such as energy, power, and communication link bandwidth. To improve the situation, this article proposes an anonymous authentication protocol suitable for IoT devices with current hardware performance, which is based on elliptic curve and signcryption techniques. Compared to other protocols, our protocol further reduces the communication and computing cost of the client devices while ensuring security requirements. Thus, we formally prove its theoretical security under the random oracle model and use simulation experiments to verify that the protocol can effectively reduce the resource requirements.
引用
收藏
页码:1818 / 1829
页数:12
相关论文
共 50 条
  • [1] Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
    Lara, Evangelina
    Aguilar, Leocundo
    Sanchez, Mauricio A.
    Garcia, Jesus A.
    [J]. SENSORS, 2020, 20 (02)
  • [2] Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things
    Sheng, Zhengguo
    Wang, Hao
    Yin, Changchuan
    Hu, Xiping
    Yang, Shusen
    Leung, Victor C. M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (05): : 402 - 411
  • [3] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [4] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    [J]. Journal of Systems Architecture, 2022, 133
  • [5] Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices
    Ibrahim, Nahla
    Agbinya, Johnson
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [6] LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices
    Zhang, Wensheng
    Wang, Chuang
    [J]. NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 277 - 287
  • [7] Anonymous data sharing scheme for resource-constrained internet of things environments
    Zhang, Zetian
    Wang, Jingyu
    Liu, Lixin
    Li, Yongfeng
    Hao, Yun
    Yang, Hanqing
    [J]. AD HOC NETWORKS, 2024, 163
  • [8] Compressed lightweight deep learning models for resource-constrained Internet of things devices in the healthcare sector
    Habib, Gousia
    Qureshi, Shaima
    [J]. EXPERT SYSTEMS, 2023, 42 (01)
  • [9] Neural Architecture Search for Resource-Constrained Internet of Things Devices
    Cardoso-Pereira, Isadora
    Lobo-Pappa, Gisele
    Ramos, Heitor S.
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [10] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685