AKAIoTs: authenticated key agreement for Internet of Things

被引:36
|
作者
Saeed, Mutaz Elradi S. [1 ,3 ]
Liu, Qun-Ying [2 ,3 ]
Tian, GuiYun [2 ,3 ]
Gao, Bin [2 ,3 ]
Li, Fagen [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Internet Things Secur & Privacy, Chengdu, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu, Sichuan, Peoples R China
[3] Newcastle Univ, Sch Engn, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Wireless sensor network (WSNs); Elliptic curve cryptography (ECC); Identity-based; Authenticated key establishment (AKE); Internet of Things (IoTs); BROADCAST AUTHENTICATION; ELLIPTIC-CURVES; SECURITY; EFFICIENT; CRYPTOGRAPHY; MANAGEMENT; FRAMEWORK; PROTOCOLS; SCHEME;
D O I
10.1007/s11276-018-1704-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WSNs are one of the important components in the Internet of Things (IoTs), since they enable gathering and transmitting of data to the cloud server via the Internet medium. Designing an efficient secure cryptography scheme for the IoTs is a challenging task, since sensor node is a resource-constrained device. In this paper, an authentication key agreement scheme is proposed to build a secure channel between WSNs and a cloud server in the IoTs. The proposed scheme has two properties: (1) it has a lightweight computation, and (2) it provides various security properties of key agreement. In addition, it is proven to be secure under computation Diffe-Hellman assumption in the random oracle model. AKAIoTs is implemented using Contiki OS and use Z1 emulator to evaluate time overhead and memory usage. Three different curves; BN-P158, SECG-P160 and NIST-P192 are used. The implementation results verify that, the proposed scheme is computationally efficient and memory usage between 51 and 52% from total memory of ROM, and between 59 and 62% from total memory of RAM for three different security levels. As a result, curve SECG-P160 might be a good choice to supply security for the IoTs devices, since it consumes reasonable time which result in less power consumption than curve NIST-P192 and more secure than curve BN-P158. Compared with existing relevant schemes, the proposed AKAIoTs is efficient in terms of energy consumption. Moreover, two application scenarios are given to show how the proposed scheme can be applied in the IoTs applications.
引用
收藏
页码:3081 / 3101
页数:21
相关论文
共 50 条
  • [21] A New Lightweight Authentication and Key agreement Protocol For Internet of Things
    Arasteh, Sima
    Aghili, Seyed Farhad
    Mala, Hamid
    [J]. 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 52 - 59
  • [22] A WSN-oriented Key Agreement Protocol in Internet of Things
    Liu, Tao
    Guan, Yawen
    Yan, Yiqun
    Liu, Li
    Deng, Qichao
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 1792 - +
  • [23] A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
    Hasan, Mohammad Kamrul
    Zhou, Weichen
    Safie, Nurhizam
    Ahmed, Fatima Rayan Awad
    Ghazal, Taher M.
    [J]. IEEE ACCESS, 2024, 12 : 61642 - 61666
  • [24] Password-Based Authenticated Key Exchange Based on Signcryption for the Internet of Things
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    [J]. 2019 WIRELESS DAYS (WD), 2019,
  • [25] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [26] TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    Ahmim, Marwa
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2020, 11 (03): : 1 - 21
  • [27] Authenticated group key agreement for multicast
    Wang, Liming
    Wu, Chuan-Kun
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 55 - +
  • [28] The GN-authenticated key agreement
    Stephanides, G
    Constantinescu, N
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 531 - 544
  • [29] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [30] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 645 - 650