A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT

被引:8
作者
Zhou, Yousheng [1 ,2 ]
Liu, Tong [1 ]
Tang, Fei [1 ,2 ]
Wang, Feng [3 ]
Tinashe, Magara [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[3] De Zhou Univ, Coll Math Sci, Dezhou 253023, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; security; authentication; anonymity; deniability; 2-FACTOR USER AUTHENTICATION; WIRELESS SENSOR NETWORKS; MUTUAL AUTHENTICATION; SECURE; PROTOCOL; IDENTITY;
D O I
10.3390/electronics8040450
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication for the Internet of Things (IoT) is a vital measure as it consists of numerous unattended connected devices and sensors. For security, only the user authenticated by the gateway node can access the real-time data gathered by sensor nodes. In this article, an efficient privacy-preserving authentication and key agreement scheme for IoT is developed which enables the user, the gateway node and sensor nodes to authenticate with each other. Only the trusted gateway node can determine the real identity of user; however, no other entities can get information about user' identity by just intercepting all exchanged messages during authentication phase. The gateway cannot prove the received messages from the sender to a third party, and thus preserving the privacy of the sender. The correctness of the proposed scheme is proved to be feasible by using BAN logic, and its security is proved under the random oracle model. The execution time of the proposed scheme is evaluated and compared with existing similar schemes, and the results demonstrate that our proposed scheme is more efficient and applicable for IoT applications.
引用
收藏
页数:19
相关论文
共 27 条
[1]  
Abdalla M., 2015, PASSWORD BASED AUTHE, P65
[2]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[3]   An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Castiglione, Aniello ;
Palmieri, Francesco .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :351-358
[4]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]   A lightweight Mutually Authenticated Key-Agreement scheme for Wireless Body Area Networks in Internet of Things Environment [J].
Gupta, Ankur ;
Tripathi, Meenakshi .
MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, :804-806
[8]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[9]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[10]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277