EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:2
|
作者
Algubili, Bahaa Hussein Taher [1 ,2 ]
Kumar, Neeraj [3 ]
Lu, Hongwei [1 ]
Yassin, Ali A. [4 ]
Boussada, Rihab [5 ]
Mohammed, Alzahraa J. [4 ]
Liu, Huiyu [1 ]
机构
[1] Huazhong Univ Sci & Technol, Comp Sci, Wuhan 430074, Hubei, Peoples R China
[2] Univ Basrah, Coll Sci, Dept Math, Basrah, Iraq
[3] Thapar Inst Engn & Technol Deemed Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[4] Univ Basrah, Educ Coll Pure Sci, Dept Comp Sci, Basrah 61004, Iraq
[5] SESAME Univ, Ariana, Tunisia
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; CHAOTIC MAPS; MUTUAL AUTHENTICATION; INTERNET; ESTABLISHMENT; LIGHTWEIGHT;
D O I
10.1007/s12083-022-01328-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:20
相关论文
共 50 条
  • [41] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [42] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [43] Secure and Efficient Authentication Scheme in IoT Environments
    Thakare, Abhijeet
    Kim, Young-Gab
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [44] Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Yannam, Animi Reddy
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2019, 7 : 55382 - 55397
  • [45] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [46] A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
    Alzahrani, Bander A.
    Irshad, Azeem
    Alsubhi, Khalid
    Albeshri, Aiiad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [47] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [48] A Novel Secure Authentication Protocol for IoT and Cloud Servers
    Iqbal, Ummer
    Tandon, Aditya
    Gupta, Sonali
    Yadav, Arvind R.
    Neware, Rahul
    Gelana, Fraol Waldamichael
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [49] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990
  • [50] A Multi-Stage Secure IoT Authentication Protocol
    Alhusayni, Khalid
    Wazirali, Raniyah
    AlAkhras, Mousa
    Almasri, Marwah
    Alhazmi, Samah
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 459 - 481