A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment

被引:110
作者
Banerjee, Soumya [1 ]
Odelu, Vanga [2 ]
Das, Ashok Kumar [3 ]
Srinivas, Jangirala [4 ]
Kumar, Neeraj [5 ]
Chattopadhyay, Samiran [1 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Jadavpur Univ Salt Lake City, Dept Informat Technol, Kolkata 700098, India
[2] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Hyderabad Campus, Hyderabad 500078, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] OP Jindal Global Univ, Jindal Global Business Sch, Sonipat 131001, Haryana, India
[5] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Internet of Things (IoT); key agreement; security; session key; user authentication; WIRELESS SENSOR NETWORKS; PROTOCOL; IOT; BIOMETRICS;
D O I
10.1109/JIOT.2019.2923373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing adoption rate of Internetenabled devices [also known as Internet of Things (IoT) devices] in applications such as smart home, smart city, smart grid, and healthcare applications, we need to ensure the security and privacy of data and communications among these IoT devices and the underlying infrastructure. For example, an adversary can easily tamper with the information transmitted over a public channel, in the sense of modification, deletion, and fabrication of data-in-transit and data-in-storage. Time-critical IoT applications such as healthcare may demand the capability to support external parties (users) to securely access IoT data and services in realtime. This necessitates the design of a secure user authentication mechanism, which should also allow the user to achieve security and functionality features such as anonymity and un-traceability. In this paper, we propose a new lightweight anonymous user authenticated session key agreement scheme in the IoT environment. The proposed scheme uses three-factor authentication, namely a user's smart card, password, and personal biometric information. The proposed scheme does not require the storing of user specific information at the gateway node. We then demonstrate the proposed scheme's security using the broadly accepted real-or-random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and automated validation of Internet security protocols and applications (AVISPAs) software simulation tool, as well as presenting an informal security analysis to demonstrate its other features. In addition, through our simulations, we demonstrate that the proposed scheme outperforms existing related user authentication schemes, in terms of its security and functionality features, and computation costs.
引用
收藏
页码:8739 / 8752
页数:14
相关论文
共 51 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[3]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[4]  
[Anonymous], 2018, WIRELESS COMMUN MOBI
[5]  
[Anonymous], 2020, FUTURE GENER COMP SY, DOI DOI 10.1016/j.future.2018.04.019
[6]  
[Anonymous], 2009, ADV INFORM SECURITY
[7]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[10]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043