An Efficient Key Management and Authentication Protocol for IoT Networks

被引:0
作者
Reddy, Alumuru Mahesh [1 ]
Rao, M. Kameswara [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept ECM, Vaddeswaram 522302, Andhra Pradesh, India
来源
PRZEGLAD ELEKTROTECHNICZNY | 2023年 / 99卷 / 10期
关键词
Internet of Things (IoT); AVISPA; RFID; Wireless Sensor Networks (WSN); Mutual Authentication; MUTUAL AUTHENTICATION; SCHEME; AGREEMENT; SECURITY; INTERNET;
D O I
10.15199/48.2023.10.30
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing integration of IoT technology into our daily lives through applications, it is critical to assure these systems security and privacy problems. Furthermore, time-critical IoT applications in healthcare necessary access to real-time private information from third parties (users) via wireless communication devices As a consequence; user identity concerns have to be handled in IoT wireless sensor system networks. (WSNs). In this paper, a secure and compact three-factor identification technique for future IoT WSN applications that relies on user biometric feature extraction. The method that was proposed depends on hash and XOR functions, and it includes (i) three-factor authentication; (ii) a shared session key; (iii) mutual authentication; and (iv) key freshness. The simulation tool here using is AVISPA for Rapid Verification of Internet Security Protocols and an informal security research that confirms its other qualities. Furthermore, our calculations show suggested method outperforms existing similar authentication methods with respect to of safety and usefulness, as well as communications and computing costs. Furthermore, the proposed protocol is suitable for usage in the vast majority of IoT and WSN applications
引用
收藏
页码:153 / 159
页数:7
相关论文
共 27 条
[1]  
Alkhayyat A, 2019, International Journal on Communications Antenna and Propagation (IRECAP), V9, P198, DOI 10.15866/irecap.v9i3.16768
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[4]   Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments [J].
Chen, Chi-Tung ;
Lee, Cheng-Chi ;
Lin, Iuon-Chang .
PLOS ONE, 2020, 15 (04)
[5]   A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks [J].
Chen, Ying ;
Ge, Yangming ;
Wang, Wenyuan ;
Yang, Fengyu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04) :1779-1798
[6]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[7]  
Dhillon Parwinder Kaur, 2018, Journal of Reliable Intelligent Environments, V4, P141, DOI [10.1007/s40860-018-0062-5, 10.1007/s40860-018-0062-5]
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications [J].
Fang, Dongfeng ;
Qian, Yi ;
Hu, Rose Qingyang .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3474-3484
[10]   On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks [J].
He, Jun ;
Yang, Zheng ;
Zhang, Jianxun ;
Liu, Wanping ;
Liu, Chao .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01)