Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme

被引:3
|
作者
Bentahar, Atef [1 ]
Meraoumia, Abdallah [1 ]
Bradji, Louardi [1 ]
Bendjenna, Hakim [1 ]
机构
[1] Larbi Tebessi Univ, Lab Math Informat & Syst LAMIS, Tebessa 12002, Algeria
关键词
Internet of Things; Sensing as a service; Key agreement; Fuzzy extractor; Elliptic curve Diffie-Hellman; Biometric cryptosystem; AVISPA; USER AUTHENTICATION; BIOMETRICS; IOT;
D O I
10.1016/j.jksuci.2021.06.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) sensing capabilities are now available as a public service. This new model, called sensing as a service (S2aaS), allows data owners to sell and/or exchange data with consumers interested in large open markets. However, the openness of the service industry makes the IoT-based S2aaS model more susceptible to malicious attacks. In this article, we propose a simple, efficient, and secure key agreement scheme for IoT-based S2aaS model. Users in the proposed system can securely and quickly access public services through a simple website rather than a traditional smart card. To simulate a real S2aaS environment, the cloud is treated as an untrusted node in the proposed method, and not all channels are secure. The fuzzy extractor and elliptic-curve Diffie-Hellman algorithms are used in conjunction with symmetric encryption and hash functions to establish a secure key agreement and data exchange session. In critical and frequent intervals, heavy processes are avoided. The proposed scheme's security has been informally analyzed and formally proven using the Automated Validation of Internet Security Protocols and Applications tool. The results show that our scheme satisfies the security requirements. (c) 2021 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:5493 / 5509
页数:17
相关论文
共 50 条
  • [1] An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment
    Almuhaideb, Abdullah M.
    Al-Khulaifi, Dania M.
    IEEE ACCESS, 2024, 12 : 175773 - 175789
  • [2] An efficient authentication and key agreement scheme for e-health applications in the context of internet of things
    Khemissa H.
    Tandjaoui D.
    Bouzefrane S.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 355 - 390
  • [3] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu, Wenlong
    Chen, Xuexiao
    Jiang, Linmei
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 101 : 52 - 61
  • [4] A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things
    Xu, Zisang
    Xu, Cheng
    Liang, Wei
    Xu, Jianbo
    Chen, Haixian
    IEEE ACCESS, 2019, 7 : 53922 - 53931
  • [5] An Efficient Authentication and Service Key Agreement Scheme in IOT Environments
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 715 - 723
  • [6] SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
    Nahnah, Oussama
    Cherbal, Sarra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [7] SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
    Zhang, Yunru
    He, Debiao
    Vijayakumar, Pandi
    Luo, Min
    Huang, Xinyi
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9716 - 9726
  • [8] A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles
    Xu, Zisang
    Li, Xiong
    Xu, Jianbo
    Liang, Wei
    Choo, Kim-Kwang Raymond
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [9] An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
    Farash, Mohammad Sabzinejad
    Turkanovic, Muhamed
    Kumari, Saru
    Hoelbi, Marko
    AD HOC NETWORKS, 2016, 36 : 152 - 176
  • [10] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):