ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement

被引:5
作者
Cherbal, Sarra [1 ]
Benchetioui, Rania [2 ]
机构
[1] Univ Setif 1, Dept Comp Sci, LRSD Lab, Setif, Algeria
[2] Univ Setif 1, Dept Comp Sci, Setif, Algeria
关键词
Internet of things; Smart-cards; Security; Mutual authentication; Key agreement; Elliptic curve cryptography; AVISPA; Scyther; SCHEME; EFFICIENT; INTERNET; LOGIC;
D O I
10.1016/j.compeleceng.2023.108759
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a fast-growing trend in wireless communication where various connected objects become an everyday part of our lives. The richness of the network is leading to open challenges and exposure to various attacks. Thus, security remains a major concern. Our purpose for this paper is to propose a smart card-based protocol that enables mutual authentication between a user and a server and allows for the establishment of a secure session key. In this context, we use Elliptic curve cryptography (ECC) and other lightweight operations as hash function and exclusive OR (XOR). We perform an evaluation of our protocol using Burrows-Abadi-Needham (BAN) logic, Scyther verification tool and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results show that our solution is robust to most known attacks, suitable to IoT devices and more efficient compared to recent related protocols.
引用
收藏
页数:20
相关论文
共 30 条
[21]   A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things [J].
Nikravan, Mohammad ;
Reza, Akram .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (01) :463-494
[22]   ECCbAP: A secure ECC-based authentication protocol for IoT edge devices [J].
Rostampour S. ;
Safkhani M. ;
Bendavid Y. ;
Bagheri N. .
Pervasive and Mobile Computing, 2020, 67
[23]   RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications [J].
Safkhani, Masoumeh ;
Bagheri, Nasour ;
Kumari, Saru ;
Tavakoli, Hamidreza ;
Kumar, Sachin ;
Chen, Jiahui .
IEEE ACCESS, 2020, 8 :200851-200862
[24]   A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications [J].
Sharma, Geeta ;
Kalra, Sheetal .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 :95-106
[25]   Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment [J].
Shunmuganathan, Saraswathi ;
Saravanan, Renuka Devi ;
Palanichamy, Yogesh .
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2015, 38 (01) :20-30
[26]   End to end light weight mutual authentication scheme in IoT-based healthcare environment [J].
Suganthi S.D. ;
Anitha R. ;
Sureshkumar V. ;
Harish S. ;
Agalya S. .
Journal of Reliable Intelligent Environments, 2020, 6 (01) :3-13
[27]   Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks [J].
Wang, Ding ;
Li, Wenting ;
Wang, Ping .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) :4064-4075
[28]  
Weng L, 2011, LECT NOTES COMPUT SC, V7025, P108, DOI 10.1007/978-3-642-24712-5_9
[29]   PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home [J].
Xia, Yandong ;
Qi, Rongxin ;
Ji, Sai ;
Shen, Jian ;
Miao, Tiantian ;
Wang, Huaqun .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[30]   Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA [J].
Yogesh, Patil Rachana ;
Satish, Devane R. .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :1334-1344