AKAIoTs: authenticated key agreement for Internet of Things

被引:36
|
作者
Saeed, Mutaz Elradi S. [1 ,3 ]
Liu, Qun-Ying [2 ,3 ]
Tian, GuiYun [2 ,3 ]
Gao, Bin [2 ,3 ]
Li, Fagen [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Internet Things Secur & Privacy, Chengdu, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu, Sichuan, Peoples R China
[3] Newcastle Univ, Sch Engn, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Wireless sensor network (WSNs); Elliptic curve cryptography (ECC); Identity-based; Authenticated key establishment (AKE); Internet of Things (IoTs); BROADCAST AUTHENTICATION; ELLIPTIC-CURVES; SECURITY; EFFICIENT; CRYPTOGRAPHY; MANAGEMENT; FRAMEWORK; PROTOCOLS; SCHEME;
D O I
10.1007/s11276-018-1704-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WSNs are one of the important components in the Internet of Things (IoTs), since they enable gathering and transmitting of data to the cloud server via the Internet medium. Designing an efficient secure cryptography scheme for the IoTs is a challenging task, since sensor node is a resource-constrained device. In this paper, an authentication key agreement scheme is proposed to build a secure channel between WSNs and a cloud server in the IoTs. The proposed scheme has two properties: (1) it has a lightweight computation, and (2) it provides various security properties of key agreement. In addition, it is proven to be secure under computation Diffe-Hellman assumption in the random oracle model. AKAIoTs is implemented using Contiki OS and use Z1 emulator to evaluate time overhead and memory usage. Three different curves; BN-P158, SECG-P160 and NIST-P192 are used. The implementation results verify that, the proposed scheme is computationally efficient and memory usage between 51 and 52% from total memory of ROM, and between 59 and 62% from total memory of RAM for three different security levels. As a result, curve SECG-P160 might be a good choice to supply security for the IoTs devices, since it consumes reasonable time which result in less power consumption than curve NIST-P192 and more secure than curve BN-P158. Compared with existing relevant schemes, the proposed AKAIoTs is efficient in terms of energy consumption. Moreover, two application scenarios are given to show how the proposed scheme can be applied in the IoTs applications.
引用
收藏
页码:3081 / 3101
页数:21
相关论文
共 50 条
  • [1] AKAIoTs: authenticated key agreement for Internet of Things
    Mutaz Elradi S. Saeed
    Qun-Ying Liu
    GuiYun Tian
    Bin Gao
    Fagen Li
    [J]. Wireless Networks, 2019, 25 : 3081 - 3101
  • [2] Lightweight and escrow-less authenticated key agreement for the internet of things
    A. Simplicio, Marcos, Jr.
    Silva, Marcos V. M.
    Alves, Renan C. A.
    Shibata, Tiago K. C.
    [J]. COMPUTER COMMUNICATIONS, 2017, 98 : 43 - 51
  • [3] Efficient Authenticated Key Agreement Protocol for Cloud-Based Internet of Things
    Muthukumaran, V
    Kumar, V. Vinoth
    Joseph, Rose Bindu
    Munirathnam, Meram
    Beschi, I. S.
    Niveditha, V. R.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 365 - 373
  • [4] Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things
    Nguyen, Kim Thuat
    Oualha, Nouha
    Laurent, Maryline
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 339 - 358
  • [5] Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
    Li, Chaoyang
    Guo, Yanbu
    Dong, Mianxiong
    Xu, Gang
    Chen, Xiu-Bo
    Li, Jian
    Ota, Kaoru
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 2043 - 2059
  • [6] Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
    Yang, Zheng
    He, Jun
    Tian, Yangguang
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6584 - 6596
  • [7] Authenticated Key Management Protocols for Internet of Things
    Li, Celia
    Yang, Cungang
    [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 126 - 129
  • [8] Symmetric-bivariate-polynomial-based Lightweight Authenticated Group Key Agreement for Industrial Internet of Things
    Wu, Shan
    Hsu, Chingfang
    Xia, Zhe
    Zhang, Jinlong
    Wu, Di
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (07): : 1969 - 1979
  • [9] Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things
    Wei, Guanglu
    Fan, Kai
    Zhang, Kuan
    Wang, Haoyang
    Li, Hui
    Yang, Yintang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 9213 - 9225
  • [10] Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1133 - 1146