ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement

被引:5
作者
Cherbal, Sarra [1 ]
Benchetioui, Rania [2 ]
机构
[1] Univ Setif 1, Dept Comp Sci, LRSD Lab, Setif, Algeria
[2] Univ Setif 1, Dept Comp Sci, Setif, Algeria
关键词
Internet of things; Smart-cards; Security; Mutual authentication; Key agreement; Elliptic curve cryptography; AVISPA; Scyther; SCHEME; EFFICIENT; INTERNET; LOGIC;
D O I
10.1016/j.compeleceng.2023.108759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a fast-growing trend in wireless communication where various connected objects become an everyday part of our lives. The richness of the network is leading to open challenges and exposure to various attacks. Thus, security remains a major concern. Our purpose for this paper is to propose a smart card-based protocol that enables mutual authentication between a user and a server and allows for the establishment of a secure session key. In this context, we use Elliptic curve cryptography (ECC) and other lightweight operations as hash function and exclusive OR (XOR). We perform an evaluation of our protocol using Burrows-Abadi-Needham (BAN) logic, Scyther verification tool and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results show that our solution is robust to most known attacks, suitable to IoT devices and more efficient compared to recent related protocols.
引用
收藏
页数:20
相关论文
共 30 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[4]   Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment [J].
Bera, Basudeb ;
Vangala, Anusha ;
Das, Ashok Kumar ;
Lorenz, Pascal ;
Khan, Muhammad Khurram .
COMPUTER STANDARDS & INTERFACES, 2022, 80
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]   An Efficient and Secure Smart Card Based Authentication Scheme [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Wang, King-Hang ;
Zhang, Yong ;
Wu, Tsu-Yang .
JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04) :1113-1123
[7]  
Cremers C, 2012, Florida's and Minnesota's operational protocols had not been approved as of April 2012
[8]   A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment [J].
Dewanta, Favian ;
Mambo, Masahiro .
IEEE ACCESS, 2019, 7 :103095-103114
[9]   Secure multi-factor remote user authentication scheme for Internet of Things environments [J].
Dhillon, Parwinder Kaur ;
Kalra, Sheetal .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
[10]   Internet of Things: Applications, security and privacy: A survey [J].
Goyal, Parul ;
Sahoo, Ashok Kumar ;
Sharma, Tarun Kumar ;
Singh, Pramod K. .
MATERIALS TODAY-PROCEEDINGS, 2021, 34 :752-759