A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment

被引:7
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Weng, Chi-Yao [4 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[4] Natl Pingtung Univ, Dept Comp Sci, Neipu, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 01期
关键词
Authentication; Cryptanalysis; Internet of Things; Three party key establishment; USER AUTHENTICATION; ROUTING PROTOCOL; WIRELESS; AGREEMENT;
D O I
10.3966/160792642018011901014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure three party node authentication and key establishment scheme for data exchange in the Internet of Things (IoT) applications enables two resource-constrained nodes to establish a secure end-to-end communication channel with the help of a data server. Since node in IoT have constraints on resources such as power, memory space and computation ability. Thus may existing key establishment schemes are unable to run IoT applications and many researchers are already working on how to integrate new techniques and efficient approaches into the IoT environment. Recently, Nasiraee and Mohasefi proposed a highly efficient and novel key establishment scheme for Internet-Enable Sensor Networks (IESN) which was adapted to the IoT notion. Nasiraee-Mohasefi's scheme presented a novel approach where a new node that joins the IoT network is responsible to aggregate interested neighbors' information and to send a request to the trusted server to get required pairwise session keys. However, we found that Nasiraee-Mohasefi's scheme has some security and efficiency shortcomings and this paper focuses on preventing the above-mentioned weaknesses of Nasiraee-Mohasefi's scheme by proposing an improved three party node authentication and key establishment scheme. The results of security proof by BAN logic analysis confirms the proposed scheme provides a considerable gains in power saving while its security properties are ensured for the Internet of Things environment.
引用
收藏
页码:147 / 155
页数:9
相关论文
共 41 条
[1]  
[Anonymous], INT J NETW SECUR
[2]  
[Anonymous], 2012, INT J NETW SECUR
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Privacy-Preserving Channel Access for Internet of Things [J].
Banerjee, Debasmit ;
Dong, Bo ;
Taghizadeh, Mahmoud ;
Biswas, Subir .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05) :430-445
[5]   SIR: a secure and intelligent routing protocol for vehicular ad hoc network [J].
Bhoi, Sourav Kumar ;
Khilar, Pabitra Mohan .
IET NETWORKS, 2015, 4 (03) :185-194
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]  
Debiao He, 2013, International Journal of Network Security, V15, P350
[8]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[9]  
He D., 1993, INFORM SCI, V321, P263
[10]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60