Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

被引:275
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
Odelu, Vanga [2 ]
Kumar, Neeraj [3 ]
Conti, Mauro [4 ]
Jo, Minho [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Prades, India
[2] Korea Univ, Dept Comp Convergence Software, Sejong City 30019, South Korea
[3] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[4] Univ Padua, Dept Math, I-35122 Padua, Italy
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 01期
基金
新加坡国家研究基金会;
关键词
Authentication; automated validation of Internet security protocols and applications (AVISPAs) simulation; generic Internet of Things (IoT) network; hierarchical IoT network (HIoTN); key management; security; WIRELESS SENSOR NETWORKS; AGREEMENT SCHEME; MUTUAL AUTHENTICATION; ESTABLISHMENT;
D O I
10.1109/JIOT.2017.2780232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid, industrial Internet, connected healthcare, smart retail, smart supply chain and smart farming. The hierarchical IoT network (HIoTN) is a special kind of the generic IoT network, which is composed of the different nodes, such as the gateway node, cluster head nodes, and sensing nodes organized in a hierarchy. In HIoTN, there is a need, where a user can directly access the real-time data from the sensing nodes for a particular application in generic IoT networking environment. This paper emphasizes on the design of a new secure lightweight three-factor remote user authentication scheme for HIoTNs, called the user authenticated key management protocol (UAKMP). The three factors used in UAKMP are the user smart card, password, and personal biometrics. The security of the scheme is thoroughly analyzed under the formal security in the widely accepted real-or-random model, the informal security as well as the formal security verification using the widely accepted automated validation of Internet security protocols and applications tool. UAKMP offers several functionality features including offline sensing node registration, freely password and biometric update facility, user anonymity, and sensing node anonymity compared to other related existing schemes. In addition, UAKMP is also comparable in computation and communication costs as compared to other existing schemes.
引用
收藏
页码:269 / 282
页数:14
相关论文
共 50 条
  • [1] Mutually Authenticated Group Key Management Protocol for Healthcare IoT Networks
    Kausar, Firdous
    Aman, Waqas
    Al-Abri, Dawood
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2, 2020, 1070 : 1 - 12
  • [2] Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
    Li, Wei
    Li, Xuelian
    Gao, Juntao
    Wang, Haiyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1276 - 1290
  • [3] A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
    Tan, Hengchuan
    Ma, Maode
    Labiod, Houda
    Boudguiga, Aytnen
    Zhang, Jun
    Chong, Peter Han Joo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 9570 - 9584
  • [4] A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications
    Abi-char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    2020 43RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2020, : 50 - 56
  • [5] Secure Authenticated Key Establishment Protocol for Ad hoc Networks
    Prakash, A. John
    Uthariaraj, V. Rhymend
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 87 - 94
  • [6] On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [7] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [8] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [9] Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
    Wazid, Mohammad
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Susilo, Willy
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 391 - 406
  • [10] A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
    Barakat, Tamer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 136 - 140