A Robust Anonymous Remote User Authentication Protocol for IoT Services

被引:0
|
作者
Meysam Ghahramani
Reza Javidan
机构
[1] Shiraz University of Technology,Computer Engineering and Information Technology Department
来源
关键词
Key agreement; Authentication; ECC; BAN logic; Internet of things;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things (IoT), as one of the hottest topics, supports resource-constrained devices which can communicate with each other at any time. Moreover, the communication must be secure on public networks, and it is sometimes necessary to control remote devices using a secure protocol. Consequently, designing a lightweight protocol is one of the challenging points to be addressed. So far, several lightweight protocols have been proposed―this paper analyzes one of the current lightweight authentication protocols for the IoT. Based on the previous protocol, a secure protocol has been suggested that inherits the benefits of the previous one, while it is completely safe against the proposed attacks. The proposed protocol fulfils mutual authentication using BAN logic, as a broadly accepted formal method in security analysis. Moreover, the proposed protocol resists well-known attacks and its security, communication overhead, and time complexity have been compared with similar protocols that show its efficiency for IoT applications. In the proposed protocol, users and IoT nodes share a secret key in 3.122 ms with 528 bytes communication overhead.
引用
收藏
页码:2347 / 2369
页数:22
相关论文
共 50 条
  • [11] Robust remote user authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 935 - 942
  • [12] Certificateless Anonymous User Authentication Protocol for Cloud Computing
    Zhang, Manjun
    Zhang, Yan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 200 - 203
  • [13] A robust anonymous biometric-based remote user authentication scheme using smart cards
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (02) : 193 - 210
  • [14] Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
    Horng, Wen-Bing
    Peng, Jian-Wen
    Liu, Chao-Sheng
    Chiu, Ying-Ching
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
  • [15] A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services
    Lyu, Qiuyun
    Li, Hao
    Deng, Zhining
    Wang, Jingyu
    Ren, Yizhi
    Zheng, Ning
    Liu, Junliang
    Liu, Huaping
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2546 - 2561
  • [16] Anonymous chaotic-based identity authentication protocol in IoT
    Long, Jing
    Su, Xin
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (02) : 194 - 200
  • [17] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277
  • [18] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [19] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [20] An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps
    Meshram, Chandrashekhar
    Obaidat, Mohammad S.
    Meshram, Akshaykumar
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 219 - 224