Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment

被引:13
作者
Ali, Usman [1 ,2 ]
Bin Idris, Mohd Yamani Idna [1 ,3 ]
Frnda, Jaroslav [4 ,5 ]
Bin Ayub, Mohamad Nizam [1 ]
Khan, Muhammad Asghar [6 ]
Khan, Nauman [1 ,7 ,8 ]
Beegum, T. Rehannara [1 ]
Jasim, Ahmed A. [9 ]
Ullah, Insaf [6 ]
Babar, Mohammad [10 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Swat, Charbagh Swat, Dept Comp & Software Technol, Swat 19120, Khyber Pakhtunk, Pakistan
[3] Univ Malaya, Ctr Res Mobile Cloud Comp, Kuala Lumpur 50603, Malaysia
[4] Univ Zilina, Fac Operat & Econ Transport & Commun, Dept Quantitat Methods & Econ Informat, Zilina 01026, Slovakia
[5] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Dept Telecommun, Ostrava 70800, Czech Republic
[6] Hamdard Univ, Fac Engn Sci & Technol, Islamabad Campus, Karachi, Pakistan
[7] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
[8] Univ Malakand, Dept Comp Sci & Informat Technol, Chakdara Dir Lower 18800, Khyber Pakhtunk, Pakistan
[9] Univ Baghdad, Coll Engn, Baghdad, Iraq
[10] Abbottabad Univ Sci & technol, Dept Comp Sci, Havalian, Khyber Pakhtunk, Pakistan
关键词
Authentication; AEAD; Constrained devices; Elliptic curve cryptography; Internet of things (IoT); Security; KEY EXCHANGE; PROTOCOL; DEVICES;
D O I
10.1016/j.iot.2023.100923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a fast-growing technology that enable existing systems to communicate with one another by using new devices such as sensors and other smart devices. The IoT devices such as wireless sensors and other smart devices are often very cheap, very small, and have limited power sources, memories, and processing capabilities. These devices are used in numerous critical applications, in which confidential information is sent across wireless channels among other devices participating in the system. This communication is vulnerable to multiple cyber-attacks due to the insecure wireless channel between them and without strong security mechanism, the important credential can be stolen by network attackers. One of the most important aspects of securing IoT communication is the authentication mechanism, used to validate the identity of authorized devices and users in IoT networks and to ensure data confi-dentiality, integrity, and authenticity for secure communication. Several authentication schemes for IoT environment have been proposed in the literature, none of these approaches entirely fulfil the necessary security and lightweight feature requirements. Some schemes fulfill the required security features but are unable to provide lightweight features. Similarly, other schemes provide lightweight features, but their security features are unsatisfactory. Therefore, it is necessary to design an effective security mechanism to ensure secure communication in IoT environments. In this paper, we propose Authenticated Encryption with Associated Data (AEAD) and Elliptic Curve Cryptography (ECC) based Enhanced Lightweight and Secure Certificateless Authentication Scheme (ELWSCAS) for IoT environment to fulfill the required security and lightweight performance features. The security of the proposed solution is evaluated using formal and informal security analysis. For formal security analysis we used RoR model and AVISPA tool. We have implemented the proposed solution in network simulator (NS3.35) by using Python and C++ to measure the network parameters such as throughput and packet delivery ratio (PDR). The computational and communication cost of the proposed scheme shows that in comparison to the existing state-of-the-art, our approach is considerably less costly and is a viable option for con-strained IoT environment.
引用
收藏
页数:18
相关论文
共 44 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things [J].
Abdaoui, Abderrazak ;
Erbad, Aiman ;
Al-Ali, Abdulla Khalid ;
Mohamed, Amr ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :9987-9998
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]   Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications [J].
Ali, Usman ;
Idris, Mohd Yamani Idna ;
Frnda, Jaroslav ;
Bin Ayub, Mohamad Nizam ;
Alroobaea, Roobaea ;
Almansour, Fahad ;
Shagari, Nura Modi ;
Ullah, Insaf ;
Ali, Ihsan .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02) :2515-2532
[5]   RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption [J].
Ali, Usman ;
Bin Idris, Mohd Yamani Idna ;
Bin Ayub, Mohamad Nizam ;
Ullah, Insaf ;
Ali, Ihsan ;
Nandy, Tarak ;
Yahuza, Muktar ;
Khan, Nauman .
IEEE ACCESS, 2021, 9 :49942-49959
[6]  
AVISPA S, 2019, the Security Protocol ANimator for AVISPA
[7]  
Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
[8]  
Bagheri N, 2021, IEEE Syst. J.
[9]  
Banerjee S., 2018, INT C INTELLIGENT SY
[10]  
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207