EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:0
|
作者
Bahaa Hussein Taher Algubili
Neeraj Kumar
Hongwei Lu
Ali A. Yassin
Rihab Boussada
Alzahraa J. Mohammed
Huiyu Liu
机构
[1] Huazhong University of Science and Technology,Computer Science
[2] University of Basrah,Department of Mathematics, College of Science
[3] Thapar Institute of Engineering and Technology (Deemed University),Department of Computer Science and Engineering
[4] University of Basrah,Department of Computer Science, Education College of Pure Science
[5] SESAME University,undefined
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor;
D O I
暂无
中图分类号
学科分类号
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:19
相关论文
共 50 条
  • [1] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Algubili, Bahaa Hussein Taher
    Kumar, Neeraj
    Lu, Hongwei
    Yassin, Ali A.
    Boussada, Rihab
    Mohammed, Alzahraa J.
    Liu, Huiyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2179 - 2198
  • [2] Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function
    Saleem, Muhammad Asad
    Ghaffar, Zahid
    Mahmood, Khalid
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16613 - 16622
  • [3] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [4] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [5] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277
  • [6] Provably Secure Distributed Efficient Edge Authentication Protocol with Anonymity in Internet of Vehicles
    Zhang, Haibo
    Lan, Kai
    Huang, Hongwu
    Wang, Ruyan
    Zou, Can
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (08) : 2902 - 2910
  • [7] Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
    Park, Kisung
    Park, Youngho
    Park, Yohan
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    IEEE ACCESS, 2017, 5 : 25110 - 25125
  • [8] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [9] Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems
    Rana, Minahil
    Mahmood, Khalid
    Saleem, Muhammad Asad
    Al-Turjman, Fadi
    Kolhar, Manjur Sayyadbadasha
    Altrjman, Chadi
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [10] Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings
    Tian, Chuang
    Ma, Jianfeng
    Li, Teng
    Zhang, Junwei
    Ma, Chengyan
    Xi, Ning
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4448 - 4463