Provable and secure Two-Party Authenticated Key Agreement (2PAKA) Protocol for Internet of Health Things

被引:0
作者
Ashaq Hussain Dar [1 ]
M. Tariq Banday [1 ]
机构
[1] Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar
关键词
Authentication; AVISPA; ECC; IoHT;
D O I
10.1007/s41870-024-02096-2
中图分类号
学科分类号
摘要
In the perception layer of the Internet of Health Things, deploying new nodes necessitates the usage of a Two-Party Authenticated Key Agreement (2PAKA). A malicious node deployment in the perception layer of Internet of Health Things can disrupt the functioning of the complete application based on Internet of Health Things. To be used in real-world and practical applications, a new node authentication and key exchange mechanism must meet specific security and functional requirements. Although protocols and schemes for new node deployment have been proposed in the literature but for the practical applicability of the scheme it must conform to certain functional and security specifications, In this paper, an ECC-based new node authentication and key exchange method for the perception layer of the Internet of Health Things is presented. The proposed scheme has been analysed using Random Oracle Model. In addition to meeting basic security and functional specifications, the method has been validated on AVISPA tool which indicate that the proposed scheme is safe against various attacks. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:149 / 160
页数:11
相关论文
共 11 条
  • [1] 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment
    Park, Kisung
    Park, Youngho
    Park, Yohan
    Das, Ashok Kumar
    IEEE ACCESS, 2018, 6 : 30225 - 30241
  • [2] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [3] Certificate less one-pass and two-party authenticated key agreement protocol and its extensions
    Zhang, Lei
    INFORMATION SCIENCES, 2015, 293 : 182 - 195
  • [4] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [5] New identity-based three-party authenticated key agreement protocol with provable security
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 927 - 932
  • [6] Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1133 - 1146
  • [7] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [8] Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks
    Jyothi, Asha
    Narsimha, G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 68 - 88
  • [9] One-way anal two-party authenticated ED-based key agreement protocols using pairing
    Okamoto, T
    Tso, R
    Okamoto, E
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, 3558 : 122 - 133
  • [10] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784