Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

被引:295
|
作者
Challa, Sravani [1 ]
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
Kumar, Neeraj [2 ]
Reddy, Alavalapati Goutham [3 ]
Yoon, Eun-Jun [4 ]
Yoo, Kee-Young [3 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 702701, South Korea
[4] Kyungil Univ, Dept Cyber Secur, Gyongsan 38428, South Korea
来源
IEEE ACCESS | 2017年 / 5卷
基金
新加坡国家研究基金会;
关键词
Internet of things (IoT); authentication; key establishment; Burrows-Abadi-Needham (BAN) logic; AVISPA; NS2; simulation; security; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; BROADCAST AUTHENTICATION; AGREEMENT SCHEME; INTERNET; THINGS; PROTOCOL;
D O I
10.1109/ACCESS.2017.2676119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi-Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
引用
收藏
页码:3028 / 3043
页数:16
相关论文
共 50 条
  • [1] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    [J]. SECURITY AND PRIVACY, 2024, 7 (02)
  • [2] Secure authenticated key exchange for WSNs in IoT applications
    Mingping Qi
    Jianhua Chen
    [J]. The Journal of Supercomputing, 2021, 77 : 13897 - 13910
  • [3] Secure authenticated key exchange for WSNs in IoT applications
    Qi, Mingping
    Chen, Jianhua
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 13897 - 13910
  • [4] Signature-based three-factor authenticated key exchange for internet of things applications
    Jia, Xiaoying
    He, Debiao
    Li, Li
    Choo, Kim-Kwang Raymond
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18355 - 18382
  • [5] Signature-based three-factor authenticated key exchange for internet of things applications
    Xiaoying Jia
    Debiao He
    Li Li
    Kim-Kwang Raymond Choo
    [J]. Multimedia Tools and Applications, 2018, 77 : 18355 - 18382
  • [6] Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
    Vinoth, R.
    Deborah, Lazarus Jegatha
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3801 - 3811
  • [7] Efficient provably-secure privacy-preserving signature-based key establishment protocol
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Nikooghadam, Morteza
    [J]. AD HOC NETWORKS, 2020, 100
  • [8] A Lightweight Authenticated Key Establishment Scheme for Secure Smart Grid Communications
    Salem, Fatty M.
    Ibrahim, Elham
    Elghandour, Osama
    [J]. International Journal of Safety and Security Engineering, 2020, 10 (04): : 549 - 558
  • [9] A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications
    Abi-char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    [J]. 2020 43RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2020, : 50 - 56
  • [10] A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks
    Imran Memon
    [J]. Wireless Personal Communications, 2015, 85 : 1167 - 1191