Directed Path Based Authentication Scheme for the Internet of Things

被引:0
|
作者
Ning, Huansheng [1 ]
Liu, Hong [1 ]
Liu, Qing [2 ]
Ji, Genlin [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; security; authentication protocol; directed path; SENSOR; ARCHITECTURE; STANDARDS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the directed path descriptor is introduced for the secret key distribution and cross-network authentication, and the proof mapping is applied to establish tri-dimensional equivalence relations among diverse nodes for achieving mutual authentication. Moreover, security analysis shows that DPAS achieves data confidentiality and integrity, authentication, anonymity and forward security, and performance analysis indicates that DPAS with moderate communication overhead and computation load is suitable for the IoT applications.
引用
收藏
页码:1112 / 1131
页数:20
相关论文
共 50 条
  • [41] An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment
    Almuhaideb, Abdullah M.
    Al-Khulaifi, Dania M.
    IEEE ACCESS, 2024, 12 : 175773 - 175789
  • [42] An efficient lightweight authentication scheme for human-centered industrial Internet of Things
    Singh, Jaya
    Gimekar, Ashish
    Venkatesan, Subramanian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [43] SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
    Nahnah, Oussama
    Cherbal, Sarra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [44] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    The Journal of Supercomputing, 2019, 75 : 8231 - 8261
  • [45] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [46] A replay-attack resistant Authentication Scheme for the Internet of Things
    Feng, Yuxiang
    Wang, Wenhao
    Weng, Yukai
    Zhang, Huanming
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 541 - 547
  • [47] A Privacy Preserving Authentication Scheme for Heterogeneous Industrial Internet of Things
    Tan, Zuowen
    Jiao, Jintao
    Yu, Mengjiang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [48] A two-level authentication scheme for clone node detection in smart cities using Internet of things
    Shanmugam, Anitha
    Paramasivam, Jayanthi
    COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) : 1200 - 1220
  • [49] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [50] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    A. Jabbari
    J. B. Mohasefi
    Wireless Personal Communications, 2021, 116 : 2565 - 2591