SLAK: secure lightweight scheme for authentication and key-agreement in internet of things

被引:0
作者
Nahnah, Oussama [1 ]
Cherbal, Sarra [2 ]
机构
[1] Univ Setif 1, Dept Comp Sci, Setif, Algeria
[2] Univ Setif 1, Dept Comp Sci, LRSD Lab, Setif, Algeria
关键词
authentication; internet of things; security; elliptic curve cryptography; session key; AVISPA; USER AUTHENTICATION;
D O I
10.1504/IJICS.2024.137741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things connect unlimited number of heterogeneous devices in order to facilitate services and hence touching most of daily life fields. However, security concerns are a major obstacle to the development and rapid deployment of this high technology. Thus, securing the authentication process has become very important, as it is necessary to prove the legitimacy of the communication devices. Recently, researchers are proposing several mutual authentication and session key agreement protocols. In this regard, we propose our own improved protocol that relies on login, mutual authentication and the agreement of session key in a safety way to secure communications. For the security evaluation of the proposal, we use the authentication BAN logic and the widely used AVISPA tool. The results prove the achievement of mutual authentication and session key agreement securely, in addition to its safety against some known attacks as eavesdropping and replay attacks. For a performance evaluation, we compare the proposal with recent related works in terms of computational and communication costs. The results show the lightness of our protocol and thus its suitability to heterogeneous IoT devices.
引用
收藏
页数:28
相关论文
共 36 条
[1]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[2]   A provably secure RFID authentication protocol based on ECQV for the medical internet of things [J].
Agrahari, Abhay Kumar ;
Varma, Shirshu .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) :1277-1289
[3]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[4]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[5]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[6]  
AVISPA Team, 2006, AVISPA v1.1 User Manual.
[7]   Smart card-based secure authentication protocol in multi-server IoT environment [J].
Bae, Won-il ;
Kwak, Jin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :15793-15811
[8]   Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment [J].
Bera, Basudeb ;
Vangala, Anusha ;
Das, Ashok Kumar ;
Lorenz, Pascal ;
Khan, Muhammad Khurram .
COMPUTER STANDARDS & INTERFACES, 2022, 80
[9]   PUF Based Authentication Protocol for IoT [J].
Braeken, An .
SYMMETRY-BASEL, 2018, 10 (08)
[10]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]