Directed Path Based Authentication Scheme for the Internet of Things

被引:0
|
作者
Ning, Huansheng [1 ]
Liu, Hong [1 ]
Liu, Qing [2 ]
Ji, Genlin [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; security; authentication protocol; directed path; SENSOR; ARCHITECTURE; STANDARDS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the directed path descriptor is introduced for the secret key distribution and cross-network authentication, and the proof mapping is applied to establish tri-dimensional equivalence relations among diverse nodes for achieving mutual authentication. Moreover, security analysis shows that DPAS achieves data confidentiality and integrity, authentication, anonymity and forward security, and performance analysis indicates that DPAS with moderate communication overhead and computation load is suitable for the IoT applications.
引用
收藏
页码:1112 / 1131
页数:20
相关论文
共 50 条
  • [31] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Xingxing Chen
    Qingfeng Cheng
    Weidong Yang
    Xiangyang Luo
    Frontiers of Computer Science, 2024, 18
  • [32] A DTLS Based Lightweight Authentication Scheme using Symmetric Keys for Internet of Things
    Sardeshmukh, Harshal
    Ambawade, Dayanand
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2183 - 2188
  • [33] Dickson polynomial-based secure group authentication scheme for Internet of Things
    Syed, Salman Ali
    Manickam, Selvakumar
    Uddin, Mueen
    Alsufyani, Hamed
    Shorfuzzaman, Mohammad
    Selvarajan, Shitharth
    Mohammed, Gouse Baig
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [34] PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
    Chandan Trivedi
    Keyur Parmar
    Udai Pratap Rao
    Peer-to-Peer Networking and Applications, 2024, 17 : 665 - 684
  • [35] A lightweight authentication scheme for 6LoWPAN-based Internet-of -things
    Thungon, Leki Chom
    Sahana, Subhas Chandra
    Hussain, Iftekhar
    INFORMATION SECURITY JOURNAL, 2024, 33 (04): : 443 - 453
  • [36] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [37] HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme for Internet of Things
    Hossain, Mahmud
    Noor, Shahid
    Hasan, Ragib
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 109 - 116
  • [38] A Lightweight Authentication Scheme for E-health applications in the context of Internet of Things
    Khemissa, Hamza
    Tandjaoui, Djamel
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 90 - 95
  • [39] An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology
    Wu, Longfei
    Du, Xiaojiang
    Wang, Wei
    Lin, Bin
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 769 - 773
  • [40] A Mutual Authentication Scheme with User Anonymity for Cyber-Physical and Internet of Things
    Lu, Yung-Feng
    Kuo, Chin-Fu
    Chen, Hung-Ming
    Wang, Guan-Bo
    Chou, Shih-Chun
    PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 88 - 93