Secure and Efficient Authentication Scheme in IoT Environments

被引:10
|
作者
Thakare, Abhijeet
Kim, Young-Gab [1 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 03期
关键词
authentication scheme; elliptic-curve cryptography (ECC); Internet of Things; cloud; pairing-based cryptography (PBC);
D O I
10.3390/app11031260
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme's security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme's working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [1] A Secure User Authentication Scheme with Biometrics for IoT Medical Environments
    Park, YoHan
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 607 - 615
  • [2] A secure three-factor authentication scheme for IoT environments
    Mirsaraei, AmirHossein Ghafouri
    Barati, Ali
    Barati, Hamid
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 87 - 105
  • [3] An Efficient Authentication and Service Key Agreement Scheme in IOT Environments
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 715 - 723
  • [4] A secure and efficient three-factor authentication protocol for IoT environments
    Li, Yi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [5] A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3474 - 3484
  • [6] A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 91 - 96
  • [7] A Broadcast Authentication Scheme in IoT Environments
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    [J]. 2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [8] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [9] Toward Designing a Secure Authentication Protocol for IoT Environments
    Hosseinzadeh, Mehdi
    Malik, Mazhar Hussain
    Safkhani, Masoumeh
    Bagheri, Nasour
    Le, Quynh Hoang
    Tightiz, Lilia
    Mosavi, Amir H.
    [J]. SUSTAINABILITY, 2023, 15 (07)
  • [10] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438