Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme

被引:19
|
作者
Nikooghadam, Mahdi [1 ]
Amintoosi, Haleh [1 ]
机构
[1] Ferdowsi Univ Mashhad, Fac Engn, Mashhad, Razavi Khorasan, Iran
关键词
authentication; cloud server; embedded device; Internet of Things; lightweight; security; 2-FACTOR USER AUTHENTICATION; WIRELESS; INTERNET; THINGS; CRYPTANALYSIS; NETWORKS; PROTOCOL; IOT;
D O I
10.1002/dac.4332
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.
引用
收藏
页数:17
相关论文
共 50 条
  • [11] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [12] Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management
    Hegde, Manjunath
    Rao, Rohini R.
    Bhat, Radhakrishna
    IEEE ACCESS, 2024, 12 : 78173 - 78192
  • [13] Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems
    Arshad, Hamed
    Rasoolzadegan, Abbas
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [14] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Hao Lin
    Fengtong Wen
    Chunxia Du
    Multimedia Tools and Applications, 2017, 76 : 2315 - 2329
  • [15] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [16] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [17] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Hamed Arshad
    Morteza Nikooghadam
    Multimedia Tools and Applications, 2016, 75 : 181 - 197
  • [18] A New Lightweight User Authentication and Key Agreement Scheme for WSN
    Darbandeh, Foroozan Ghosairi
    Safkhani, Masoumeh
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3247 - 3269
  • [19] A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones
    Chang, Ya-Fen
    Huang, Sheng-Jie
    Chen, Guan-Xi
    Tai, Wei-Liang
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 337 - 346
  • [20] An authentication and key agreement scheme for smart grid
    Safkhani, Masoumeh
    Kumari, Saru
    Shojafar, Mohammad
    Kumar, Sachin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1595 - 1616