RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications

被引:24
|
作者
Safkhani, Masoumeh [1 ]
Bagheri, Nasour [1 ,2 ,3 ]
Kumari, Saru [4 ]
Tavakoli, Hamidreza [5 ]
Kumar, Sachin [6 ]
Chen, Jiahui [7 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran 1678815811, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran 1678815811, Iran
[3] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Farmanieh Campus, Tehran 1953833511, Iran
[4] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[5] Hakim Sabzevari Univ, Dept Elect & Comp Engn, Sabzevar 9617976487, Iran
[6] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad 201009, India
[7] Guangdong Univ Technol, Sch Comp, Guangzhou 510006, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Internet of Energy; smart grid; authentication; security analysis; Elliptic Curve Cryptography; Physical Unclonable Function; 2-FACTOR AUTHENTICATION; EXCHANGE PROTOCOL; SECURITY;
D O I
10.1109/ACCESS.2020.3034447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the Internet of Things (IoT) provides many benefits for our life but it also raises many security threats. The main risk is the security of the transferred data comprising very critical information that its leakage compromises our privacy. In this regard, many security protocols have been introduced in literature, among which multi factor authentication protocols have been received considerable attention. in this paper, in the first step, the first third party security analysis of the newly proposed scheme denoted as ESEAP (designed by Kumari et al.) is presented. The provided analysis shows that this protocol has a number of security flaws including vulnerability to off-line password guessing attack, traceability attack, impersonation attack, insider attack and also desynchronization attack. For the second step, an enhanced protocol denoted as RESEAP is proposed in which we use physically unclonable function to improve its security. We prove the security of RESEAP informally and also formally in real or random model, which is a widely accepted security model to prove the security of a cryptographic protocol. While the security analysis confirms that RESEAP protocol has better security, its comparison with ESEAP also shows its higher efficiency.
引用
收藏
页码:200851 / 200862
页数:12
相关论文
共 50 条
  • [1] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [2] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [3] Cryptanalysis of ecc-based key agreement scheme for generic IoT network model
    Patel, Chintan
    Doshi, Nishant
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [4] An Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environment
    Sahoo, Asit
    Sahoo, Shreeya Swagatika
    Sahoo, Sampa
    Sahoo, Bibhudatta
    Turuk, Ashok Kumar
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [5] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [6] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [7] New ECC-Based Remote User Authentication Scheme with Key Agreement Using Smart Cards
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 601 - 608
  • [8] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Wenfeng Huang
    [J]. Scientific Reports, 14
  • [9] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [10] Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid
    Hu, Shunfang
    Chen, Yanru
    Zheng, Yilong
    Xing, Bin
    Li, Yang
    Zhang, Le
    Chen, Liangyin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5985 - 5994