A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers

被引:145
|
作者
Kumari, Saru [1 ]
Karuppiah, Marimuthu [2 ]
Das, Ashok Kumar [3 ]
Li, Xiong [4 ]
Wu, Fan [5 ]
Kumar, Neeraj [6 ]
机构
[1] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[2] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
来源
JOURNAL OF SUPERCOMPUTING | 2018年 / 74卷 / 12期
基金
中国国家自然科学基金;
关键词
Authentication; Embedded device; Internet of Things; Cloud server; Cookies; Security; INTERNET; THINGS; ENCRYPTION; PROTOCOL;
D O I
10.1007/s11227-017-2048-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is now a buzzword for Internet connectivity which extends to embedded devices, sensors and other objects connected to the Internet. Rapid development of this technology has led to the usage of various embedded devices in our daily life. However, for resource sharing and communication among these devices, there is a requirement for connecting these embedded devices to a large pool of resources like a cloud. The promising applications of IoT in Government and commercial sectors are possible by integrating cloud servers with these embedded devices. But such an integration of technologies involves security issues like data privacy and authentication of devices whenever information is exchanged between them. Recently, Kalra and Sood proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that their scheme satisfies all security requirements and is immune to various types of attacks. However, in this paper, we show that Kalra and Sood scheme is susceptible to offline password guessing and insider attacks and it does not achieve device anonymity, session key agreement, and mutual authentication. Keeping in view of the shortcomings of Kalra and Sood's scheme, we have proposed an authentication scheme based on ECC for IoT and cloud servers. In the proposed scheme in this paper, we have formally analyzed the security properties of the designed scheme by the most widely accepted and used Automated Validation of Internet Security Protocols and Applications tool. Security and performance analysis show that when compared with other related schemes, the proposed scheme is more powerful, efficient, and secure with respect to various known attacks.
引用
收藏
页码:6428 / 6453
页数:26
相关论文
共 50 条
  • [1] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Neeraj Kumar
    [J]. The Journal of Supercomputing, 2018, 74 : 6428 - 6453
  • [2] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [3] Notes on "Secure authentication scheme for IoT and cloud servers"
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Sun, Chin-Yu
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 275 - 278
  • [4] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [5] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [6] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    [J]. TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [7] A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud
    Singh, Anuj Kumar
    Nayyar, Anand
    Garg, Ankit
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 22525 - 22576
  • [8] A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud
    Anuj Kumar Singh
    Anand Nayyar
    Ankit Garg
    [J]. Multimedia Tools and Applications, 2023, 82 : 22525 - 22576
  • [9] Comments on the Authentication Scheme for IoT and Cloud Servers
    Cheng, Ting-Fang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 7 - 8
  • [10] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,