A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things

被引:19
|
作者
Ding, Xuyang [1 ]
Wang, Xiaoxiang [1 ]
Xie, Ying [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Southwest Minzu Univ, Sch Comp Sci & Engn, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Protocols; Internet of Things; Elliptic curve cryptography; Privacy; Smart meters; Anonymous authentication; Internet of Things (IoT) security; privacy protection; resource-constrained devices; SCHEME; TECHNOLOGIES; CHALLENGES; NETWORKS;
D O I
10.1109/JIOT.2021.3088641
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) in recent years, the security of IoT becomes more and more prominent. To protect data privacy and device availability, identity authentication technology has been applied to the IoT environment. However, although scholars have designed a variety of authentication protocols for the IoT environment, the resource costs of these protocols are still expensive for resource-constrained devices. In particular, when the frequent upgrade of computer hardware has led to a gradual increase in the key length of the cryptosystem, IoT devices are hard to keep up with the upgrade speed because of the balance between cost and tasks. Although the storage space has increased in recent years, the computational and communication capabilities are still limited by some physical factors, such as energy, power, and communication link bandwidth. To improve the situation, this article proposes an anonymous authentication protocol suitable for IoT devices with current hardware performance, which is based on elliptic curve and signcryption techniques. Compared to other protocols, our protocol further reduces the communication and computing cost of the client devices while ensuring security requirements. Thus, we formally prove its theoretical security under the random oracle model and use simulation experiments to verify that the protocol can effectively reduce the resource requirements.
引用
收藏
页码:1818 / 1829
页数:12
相关论文
共 50 条
  • [41] A lightweight secure cyber foraging infrastructure for resource-constrained devices
    Goyal, S
    Carter, J
    [J]. SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195
  • [42] Personalized Fair Split Learning for Resource-Constrained Internet of Things
    Chen, Haitian
    Chen, Xuebin
    Peng, Lulu
    Bai, Yuntian
    Polap, Dawid
    [J]. SENSORS, 2024, 24 (01)
  • [43] An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
    Rana, Sohel
    Hossain, Saddam
    Shoun, Hasan Imam
    Abul Kashem, Mohammod
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 267 - 275
  • [44] Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems
    Arasteh, Sima
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    [J]. 2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 1 - 7
  • [45] A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices
    Gaglio, Salvatore
    Lo Re, Giuseppe
    Martorella, Gloria
    Peri, Daniele
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 355 - 359
  • [46] EfficientMaize: A Lightweight Dataset for Maize Classification on Resource-Constrained Devices
    Asante, Emmanuel
    Appiah, Obed
    Appiahene, Peter
    Adu, Kwabena
    [J]. DATA IN BRIEF, 2024, 54
  • [47] Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
    Jung, Seung Wook
    Jung, Souhwan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [48] Design of efficient anonymous identity authentication protocol for lightweight IoT devices
    Wang, Zhenyu
    Guo, Yang
    Li, Shaoqing
    Hou, Shen
    Deng, Ding
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 49 - 61
  • [49] PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things
    Zhou, Yousheng
    Luo, Yang
    Obaidat, Mohammad S.
    Vijayakumar, P.
    Wang, Xiaojun
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [50] Reconsidering a lightweight anonymous authentication protocol
    Chen, Chien-Ming
    Wang, King-Hang
    Fang, Weicheng
    Wu, Tsu-Yang
    Wang, Eric Ke
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 9 - 14