EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:2
|
作者
Algubili, Bahaa Hussein Taher [1 ,2 ]
Kumar, Neeraj [3 ]
Lu, Hongwei [1 ]
Yassin, Ali A. [4 ]
Boussada, Rihab [5 ]
Mohammed, Alzahraa J. [4 ]
Liu, Huiyu [1 ]
机构
[1] Huazhong Univ Sci & Technol, Comp Sci, Wuhan 430074, Hubei, Peoples R China
[2] Univ Basrah, Coll Sci, Dept Math, Basrah, Iraq
[3] Thapar Inst Engn & Technol Deemed Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[4] Univ Basrah, Educ Coll Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[5] SESAME Univ, Ariana, Tunisia
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; CHAOTIC MAPS; MUTUAL AUTHENTICATION; INTERNET; ESTABLISHMENT; LIGHTWEIGHT;
D O I
10.1007/s12083-022-01328-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:20
相关论文
共 50 条
  • [21] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [22] Provably secure fog-based authentication protocol for VANETs
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Badar, Hafiz Muhammad Sanaullah
    Kharel, Rupak
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2024, 246
  • [23] A provably secure group authentication protocol for various LTE networks
    Kijjabuncha, Boriphat
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2019, 21 (06): : 957 - 970
  • [24] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [25] Provably Secure Access Authentication Protocol under Universal Network
    Zheng, Lijuan
    Han, Zhen
    Zhang, Rui
    Fan, Tongrang
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 371 - +
  • [26] An improved and provably secure privacy preserving authentication protocol for SIP
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Mahmood Ul Hassan
    Peer-to-Peer Networking and Applications, 2017, 10 : 1 - 15
  • [27] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [28] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [29] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443
  • [30] Provably Secure Asymmetric PAKE Protocol for Protecting IoT Access
    Qi, Mingping
    Hu, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7071 - 7078