A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments

被引:1
作者
Pan, Menghan [1 ]
He, Daojing [1 ]
Li, Xuru [1 ]
Chan, Sammy [2 ]
Panaousis, Emmanouil [3 ]
Gao, Yun [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[3] Univ Greenwich, Dept Comp & Math Sci, London, England
来源
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021) | 2021年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
identity authentication; key exchange; internet of things; provable security; bilinear pairing; AGREEMENT; SCHEME;
D O I
10.1109/ISCC53001.2021.9631436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect user privacy and provide better access control in Internet of Things (IoT) environments, designing an appropriate two-party authentication and key exchange protocol is a prominent challenge. In this paper, we propose a lightweight certificateless non-interactive authentication and key exchange (CNAKE) protocol for mutual authentication between remote users and smart devices. Based on elliptic curves, our lightweight protocol provides high security performance, realizes non-interactive authentication between the two entities, and effectively reduces communication overhead. Under the random oracle model, the proposed protocol is provably secure based on the Computational Diffie-Hellman and Bilinear Diffie-Hellman hardness assumption. Finally, through a series of experiments and comprehensive performance analysis, we demonstrate that our scheme is fast and secure.
引用
收藏
页数:7
相关论文
共 16 条
  • [1] Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Leng, Lu
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2016, 101 : 42 - 62
  • [2] Arasteh S, 2016, 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P52, DOI 10.1109/ISCISC.2016.7736451
  • [3] Cash D, 2008, LECT NOTES COMPUT SC, V4965, P127
  • [4] Certificateless Authenticated Key Agreement for Decentralized WBANs
    Gervais, Mwitende
    Sun, Liang
    Wang, Ke
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 268 - 290
  • [5] GSMA Homepage, GLOB
  • [6] Gupta D., 2020, IEEE SYST J
  • [7] Hsu CL, 2017, 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), P133, DOI 10.1109/ICDIM.2017.8244673
  • [8] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [9] An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
    Ma, Mimi
    He, Debiao
    Wang, Huaqun
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8065 - 8075
  • [10] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1867 - 1896