A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)

被引:86
作者
Hammi, Badis [1 ]
Fayad, Achraf [2 ]
Khatoun, Rida [2 ]
Zeadally, Sherali [3 ]
Begriche, Youcef [2 ]
机构
[1] PSB Paris Sch, F-75013 Paris, France
[2] ParisTech, Inst Mines Telecom, F-75014 Paris, France
[3] Univ Kentucky, Lexington, KY 40506 USA
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 03期
关键词
Authentication; Internet of Things; Password; Elliptic curve cryptography; Smart cities; elliptic curve cryptography (ECC); Internet of Things (IoT); isogeny; one-time password (OTP); smart city; SECURITY; TRUST;
D O I
10.1109/JSYST.2020.2970167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) enables the interconnection of physical and virtual objects that are managed by various types of hardware, software, and communication technologies. The large-scale deployment of IoT is actually enabling smart cities, smart factories, smart health, and many other applications and initiatives all over the world. Indeed, according to a recent Gartner study, 50 billion connected objects will be deployed by 2020. IoT will make our cities and daily applications smart. However, IoT technologies also open up multiple risks and privacy issues. Due to hardware limitations of IoT objects, implementing and deploying robust and efficient security and privacy solutions for the IoT environment remains a significant challenge. One-time password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. We extend the OTP principle and propose a novel approach of OTP generation that relies on elliptic curve cryptography and isogeny in order to ensure IoT security. We evaluate the efficacy of our approach with a real implementation and compared its performance with two other approaches namely, hash message authentication code-based OTP and time-based OTP. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.
引用
收藏
页码:3440 / 3450
页数:11
相关论文
共 41 条
  • [1] An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
    Ahmed, Adel Ali
    Ahmed, Waleed Ali
    [J]. SENSORS, 2019, 19 (17)
  • [2] [Anonymous], 2016, P 20 PAN HELL C INF
  • [3] [Anonymous], 2001, FIPS PUB
  • [4] [Anonymous], 2012, ISSE 2012 Securing Electronic Business Processes
  • [5] [Anonymous], 2016, Tech. rep.
  • [6] [Anonymous], 2019, BUSINESS INSIDER
  • [7] Aravindhan K., 2013, International Journal of Emerging Trends in Engineering and Development, V1, P613
  • [8] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [9] On the Practical (In-) Security of 64-bit Block Ciphers
    Bhargavan, Karthikeyan
    Leurent, Gaetan
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 456 - 467
  • [10] Boneh D., 1999, NOT AM MATH SOC, V46, P203, DOI DOI 10.14722/NDSS.2015.23264