EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:0
|
作者
Bahaa Hussein Taher Algubili
Neeraj Kumar
Hongwei Lu
Ali A. Yassin
Rihab Boussada
Alzahraa J. Mohammed
Huiyu Liu
机构
[1] Huazhong University of Science and Technology,Computer Science
[2] University of Basrah,Department of Mathematics, College of Science
[3] Thapar Institute of Engineering and Technology (Deemed University),Department of Computer Science and Engineering
[4] University of Basrah,Department of Computer Science, Education College of Pure Science
[5] SESAME University,undefined
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor;
D O I
暂无
中图分类号
学科分类号
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:19
相关论文
共 50 条
  • [31] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Ashish Kumar
    Hari Om
    Multimedia Tools and Applications, 2021, 80 : 14163 - 14189
  • [32] Efficient and provably secure IP multimedia subsystem authentication for UMTS
    Huang, Chung-Ming
    Li, Jian-Wei
    COMPUTER JOURNAL, 2007, 50 (06): : 739 - 757
  • [33] An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
    Kumar, Ashish
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14163 - 14189
  • [34] Provably secure and efficient authentication techniques for the global mobility network
    Lee, Tian-Fu
    Hwang, Tzonelih
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1717 - 1725
  • [35] Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT
    Chavan, Ajit A.
    Nighot, Mininath K.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 646 - 651
  • [36] An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks
    Thakur, Garima
    Prajapat, Sunil
    Kumar, Pankaj
    Das, Ashok Kumar
    Shetty, Sachin
    IEEE ACCESS, 2023, 11 : 114662 - 114679
  • [37] A Secure and Efficient Deniable Authentication Protocol
    Xin Xiangjun
    Chen Dongsheng
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 172 - 175
  • [38] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [39] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [40] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914