A Lightweight Authentication and Key Agreement Schemes for IoT Environments

被引:10
作者
Lee, Dae-Hwi [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan 31538, South Korea
关键词
ECQV implicit certificate; CL-PKC; authentication; key agreement; MANAGEMENT PROTOCOL; USER AUTHENTICATION; INTERNET; DESIGN; SECURITY;
D O I
10.3390/s20185350
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu-Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory.
引用
收藏
页码:1 / 18
页数:19
相关论文
共 38 条
[1]   Lightweight and escrow-less authenticated key agreement for the internet of things [J].
A. Simplicio, Marcos, Jr. ;
Silva, Marcos V. M. ;
Alves, Renan C. A. ;
Shibata, Tiago K. C. .
COMPUTER COMMUNICATIONS, 2017, 98 :43-51
[2]   An end-to-end secure key management protocol for e-health applications [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 :184-197
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
[Anonymous], 2020, FUTURE GENER COMP SY, DOI DOI 10.1016/j.future.2018.04.019
[5]  
Campagna M., SEC 4 ELLIPTIC CURVE
[6]  
Chakrabarty Shaibal, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P812, DOI 10.1109/CCNC.2016.7444889
[7]   An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks [J].
Daniel, Renu Mary ;
Rajsingh, Elijah Blessing ;
Silas, Salaja .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :156-172
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Farouk A, 2014, INT CONF DIGIT INFO, P279, DOI 10.1109/DICTAP.2014.6821696
[10]   A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing [J].
Hou, Mengbo ;
Xu, Qiuliang .
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, :412-416