Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks

被引:0
|
作者
Naidu, Devishree [1 ,2 ]
Ray, Niranjan K. [1 ]
机构
[1] Kalinga Inst Ind Technol, Sch Comp Engn, Bhubaneswar 751024, Odisha, India
[2] Ramdeobaba Univ, Dept Comp Sci & Engn & Emerging Technol, Nagpur, Maharashtra, India
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2024年 / 36卷 / 27期
关键词
EIC-EcQuV; implicit certificate; key agreement; LoRaWAN network; PKCIC; secure authentication; INTERNET;
D O I
10.1002/cpe.8283
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proposed work introduces two schemes for secure device authentication and key agreement (SDA & KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu-Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA & KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [32] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [33] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    PLOS ONE, 2020, 15 (04):
  • [34] LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems
    Ali, Hala
    Ahmed, Irfan
    COMPUTERS & SECURITY, 2024, 140
  • [35] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [36] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [37] A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications
    Abi-char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    2020 43RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2020, : 50 - 56
  • [38] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2142 - 2149
  • [39] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Bhawna Narwal
    Amar Kumar Mohapatra
    Arabian Journal for Science and Engineering, 2021, 46 : 9197 - 9219
  • [40] Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
    Ostad-Sharif, Arezou
    Arshad, Hamed
    Nikooghadam, Morteza
    Abbasinezhad-Mood, Dariush
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 882 - 892