EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:2
|
作者
Algubili, Bahaa Hussein Taher [1 ,2 ]
Kumar, Neeraj [3 ]
Lu, Hongwei [1 ]
Yassin, Ali A. [4 ]
Boussada, Rihab [5 ]
Mohammed, Alzahraa J. [4 ]
Liu, Huiyu [1 ]
机构
[1] Huazhong Univ Sci & Technol, Comp Sci, Wuhan 430074, Hubei, Peoples R China
[2] Univ Basrah, Coll Sci, Dept Math, Basrah, Iraq
[3] Thapar Inst Engn & Technol Deemed Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[4] Univ Basrah, Educ Coll Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[5] SESAME Univ, Ariana, Tunisia
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; CHAOTIC MAPS; MUTUAL AUTHENTICATION; INTERNET; ESTABLISHMENT; LIGHTWEIGHT;
D O I
10.1007/s12083-022-01328-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:20
相关论文
共 50 条
  • [1] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Bahaa Hussein Taher Algubili
    Neeraj Kumar
    Hongwei Lu
    Ali A. Yassin
    Rihab Boussada
    Alzahraa J. Mohammed
    Huiyu Liu
    Peer-to-Peer Networking and Applications, 2022, 15 : 2179 - 2198
  • [2] Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function
    Saleem, Muhammad Asad
    Ghaffar, Zahid
    Mahmood, Khalid
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16613 - 16622
  • [3] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [4] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [5] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277
  • [6] Provably Secure Distributed Efficient Edge Authentication Protocol with Anonymity in Internet of Vehicles
    Zhang, Haibo
    Lan, Kai
    Huang, Hongwu
    Wang, Ruyan
    Zou, Can
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (08) : 2902 - 2910
  • [7] Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
    Park, Kisung
    Park, Youngho
    Park, Yohan
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    IEEE ACCESS, 2017, 5 : 25110 - 25125
  • [8] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [9] Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems
    Rana, Minahil
    Mahmood, Khalid
    Saleem, Muhammad Asad
    Al-Turjman, Fadi
    Kolhar, Manjur Sayyadbadasha
    Altrjman, Chadi
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [10] Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings
    Tian, Chuang
    Ma, Jianfeng
    Li, Teng
    Zhang, Junwei
    Ma, Chengyan
    Xi, Ning
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4448 - 4463