A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things

被引:1
|
作者
Mohammad Nikravan
Akram Reza
机构
[1] Islamic Azad University,Department of Computer Engineering, Shahr
来源
关键词
Internet of things; Security management; User authentication; Key agreement; Biometrics; Digital signatures;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide interactive communication between various processing object via heterogeneous networks. By increasing the IoT usage, establishing the security of IoT becomes a big concern. One of the security related issues is user authentication; that means before a user can access to the IoT nodes, the user and IoT node must authenticate each other. In this paper, a multi-factor user authentication and key agreement protocol, with reasonable computational time, applicable for IoT environments is proposed. To gain access to the services provided by IoT nodes, first, the gateway must authenticate the user and then, with help of the gateway, the IoT node can authenticate the user. The proposed protocol uses elliptic curve cryptography (ECC) and provides: (1) mutual authentication between the user and IOT node; (2) fresh shared session key; (3) multi-factor authentication; (4) several security requirements (i.e., non-repudiation, anonymity and untraceability, etc.). Formal verification of the proposed protocol using Burrows–Abadi–Needham logic shows that the protocol achieves the desired goals. Protocol simulation using Internet Security Protocols and Applications tool proves the security and robustness of the proposed protocol against well-known attacks. Finally, comparing the proposed protocol with other protocols shows that it is efficient in terms of computational time.
引用
收藏
页码:463 / 494
页数:31
相关论文
共 50 条
  • [21] Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
    Yu, Binbin
    Li, Hongtu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09)
  • [22] Group key agreement protocol using bilinear pairing
    Elsheh, Esam
    Ben Hmaza, A.
    [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 536 - +
  • [23] A Multi-Party User Authentication and Key Agreement Protocol Based on Public Key Cryptosystem
    Yalamanchili, Sushma
    Rao, M. Kameswara
    Smitha, Ch.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 80 - 84
  • [24] Security for Ambient Assisted Living Multi-factor Authentication in the Internet of Things
    Griffin, Phillip H.
    [J]. 2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [25] Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things
    Alshaeri, Abdulaziz
    Younis, Mohamed
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 152 - 158
  • [26] Multi Factor User Authentication Mechanism using Internet of things
    Rao, M. Kameswara
    Santhi, S. G.
    Hussain, Md Ali
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [27] Multi-factor EEG-based User Authentication
    Tien Pham
    Ma, Wanli
    Dat Tran
    Phuoc Nguyen
    Dinh Phung
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 4029 - 4034
  • [28] User security authentication protocol in multi gateway scenarios of the Internet of Things
    Zhao, Junhui
    Huang, Fanwei
    Hu, Huanhuan
    Liao, Longxia
    Wang, Dongming
    Fan, Lisheng
    [J]. AD HOC NETWORKS, 2024, 156
  • [29] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Tyagi, Gaurav
    Kumar, Rahul
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 260 - 276
  • [30] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Gaurav Tyagi
    Rahul Kumar
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 260 - 276