A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments

被引:8
作者
Yuan, Minghua [1 ]
Tan, Haowen [2 ,3 ]
Zheng, Wenying [4 ]
Vijayakumar, P. [5 ]
Alqahtani, Fayez [6 ]
Tolba, Amr [7 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 210044, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[3] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Peoples R China
[4] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] King Saud Univ, Dept Software Engn, Coll Comp & Informat Sci, Riyadh 12372, Saudi Arabia
[7] King Saud Univ, Dept Comp Sci, Community Coll, Riyadh 11437, Saudi Arabia
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Authentication; elliptic curve cryptography (ECC); key agreement; smart home; SCHEME; INTERNET; LIGHTWEIGHT; SECURITY; CARD;
D O I
10.1109/JIOT.2024.3392498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid evolution of wireless communication technology, smart homes have significantly improved the quality of people's daily lives. This improvement is attributed to the utilization of 6G communication technology, known for its low latency and high transmission rates. Users can now remotely manage smart devices in their homes in real time. However, data interactions between users and smart devices are typically transmitted over public channels. This poses potential security risks. To safeguard users' confidential data from malicious interception and modification, diverse authentication protocols have been proposed. However, most protocols fail to provide features to resist impersonation attacks while providing the ability to change passwords and biometric features. To address these challenges, this article proposes a provably secure three-factor anonymous authentication and key agreement protocol based on elliptic curve cryptography, by adopting fuzzy extractor technology. We prove the security of our protocol under the random oracle model (ROR). We also perform an informal security analysis and simulate the protocol using AVISPA. The security analysis and simulation results show that the protocol can withstand various types of attacks, including smart device impersonation attack, stolen smart card attack, and so on. Through comparison with other relevant protocols, the results show that the protocol strikes a good balance between security and usability, making it highly suitable for smart home environments.
引用
收藏
页码:29615 / 29627
页数:13
相关论文
共 34 条
[1]  
[Anonymous], 2015, AVISPA: Automated validation of Internet security protocols and applications
[2]  
[Anonymous], 2019, The security protocol animator for AVISPA
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
Bagga P, 2023, Cyber Security and Applications, V1, P100001, DOI [10.1016/j.csa.2022.100001, 10.1016/j.csa.2022.100001, DOI 10.1016/J.CSA.2022.100001]
[5]   An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid [J].
Baruah, Barnana ;
Dhal, Subhasish .
2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, :447-455
[6]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[7]   Provably secure user authentication and key agreement scheme for wireless sensor networks [J].
Das, Ashok Kumar ;
Kumari, Saru ;
Odelu, Vanga ;
Li, Xiong ;
Wu, Fan ;
Huang, Xinyi .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3670-3687
[9]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208