RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications

被引:24
|
作者
Safkhani, Masoumeh [1 ]
Bagheri, Nasour [1 ,2 ,3 ]
Kumari, Saru [4 ]
Tavakoli, Hamidreza [5 ]
Kumar, Sachin [6 ]
Chen, Jiahui [7 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran 1678815811, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran 1678815811, Iran
[3] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Farmanieh Campus, Tehran 1953833511, Iran
[4] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[5] Hakim Sabzevari Univ, Dept Elect & Comp Engn, Sabzevar 9617976487, Iran
[6] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad 201009, India
[7] Guangdong Univ Technol, Sch Comp, Guangzhou 510006, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Internet of Energy; smart grid; authentication; security analysis; Elliptic Curve Cryptography; Physical Unclonable Function; 2-FACTOR AUTHENTICATION; EXCHANGE PROTOCOL; SECURITY;
D O I
10.1109/ACCESS.2020.3034447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the Internet of Things (IoT) provides many benefits for our life but it also raises many security threats. The main risk is the security of the transferred data comprising very critical information that its leakage compromises our privacy. In this regard, many security protocols have been introduced in literature, among which multi factor authentication protocols have been received considerable attention. in this paper, in the first step, the first third party security analysis of the newly proposed scheme denoted as ESEAP (designed by Kumari et al.) is presented. The provided analysis shows that this protocol has a number of security flaws including vulnerability to off-line password guessing attack, traceability attack, impersonation attack, insider attack and also desynchronization attack. For the second step, an enhanced protocol denoted as RESEAP is proposed in which we use physically unclonable function to improve its security. We prove the security of RESEAP informally and also formally in real or random model, which is a widely accepted security model to prove the security of a cryptographic protocol. While the security analysis confirms that RESEAP protocol has better security, its comparison with ESEAP also shows its higher efficiency.
引用
收藏
页码:200851 / 200862
页数:12
相关论文
共 50 条
  • [31] An ECC-based enhanced and secured authentication protocol for IoT and cloud server
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (04) : 407 - 425
  • [32] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    [J]. SN Computer Science, 4 (6)
  • [33] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    [J]. Pervasive and Mobile Computing, 2020, 67
  • [34] A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments
    Yuan M.
    Tan H.
    Zheng W.
    Vijayakumar P.
    Alqahtani F.
    Tolba A.
    [J]. IEEE Internet of Things Journal, 2024, 11 (18) : 1 - 1
  • [35] Improved ECC-Based Three-Factor Multiserver Authentication Scheme
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Islam, S. K. Hafizul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [36] Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC
    Shreeya Swagatika Sahoo
    Sujata Mohanty
    Banshidhar Majhi
    [J]. Wireless Personal Communications, 2020, 111 : 991 - 1017
  • [37] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    [J]. Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [38] An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 1 - 19
  • [39] Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Majhi, Banshidhar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (02) : 991 - 1017
  • [40] Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC
    Cao, Liling
    Liang, Mei
    Zhang, Zheng
    Cao, Shouqi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022