Secure authentication scheme for IoT and cloud servers

被引:170
作者
Kalra, Sheetal [1 ]
Sood, Sandeep K. [2 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Jalandhar 144001, Punjab, India
[2] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Gurdaspur 143521, Punjab, India
关键词
Authentication; Cookies; Cloud computing; Elliptic Curve Cryptography; Internet of Things; PROTOCOL;
D O I
10.1016/j.pmcj.2015.08.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for performing information exchange. Owing to the immense development of this technology, embedded devices are becoming more sophisticated every day and are being deployed in various arenas of life. An important advancement in today's technology is the ability to connect such devices to large resource pools such as cloud. Integration of embedded devices and cloud servers brings wide applicability of IoT in many commercial as well as Government sectors. However, the security concerns such as authentication and data privacy of these devices play a fundamental role in successful integration of these two technologies. Elliptic Curve Cryptography (ECC) based algorithms give better security solutions in comparison to other Public Key Cryptography (PKC) algorithms due to small key sizes and efficient computations. In this paper, a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed. The proposed scheme achieves mutual authentication and provides essential security requirements. The security analysis of the proposed protocol proves that it is robust against multiple security attacks. The formal verification of the proposed protocol is performed using AVISPA tool, which confirms its security in the presence of a possible intruder. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:210 / 223
页数:14
相关论文
共 38 条
[1]  
Abi-Char PE, 2007, INT CONF NEXT GEN, P235
[2]  
Afreen Rahat, 2011, International Journal of Computer Science & Information Technology, V3, P84, DOI 10.5121/ijcsit.2011.3307
[3]  
[Anonymous], 2012, P WORLD C EXP SYST W
[4]  
[Anonymous], 2010, HPDC 2010, DOI [10.1145/1851476.1851538, DOI 10.1145/1851476.1851538]
[5]  
[Anonymous], 2010, Proceedings o f the 19th ACM International Symposium on High Performance Distributed Computing, DOI DOI 10.1145/1851476.1851535
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]   Two tools for network traffic analysis [J].
Ayedemir, M ;
Bottomley, L ;
Coffin, M ;
Jeffries, C ;
Kiessler, P ;
Kumar, K ;
Ligon, W ;
Marin, J ;
Nilsson, A ;
McGovern, J ;
Rindos, A ;
Vu, K ;
Woolet, S ;
Zaglou, A ;
Zhu, K .
COMPUTER NETWORKS, 2001, 36 (2-3) :169-179
[8]  
Biswas G.P., 2011, J SYST SOFTW, V84, P1892
[9]   PKI, elliptic curve cryptography, and digital signatures [J].
Caelli, WJ ;
Dawson, EP ;
Rea, SA .
COMPUTERS & SECURITY, 1999, 18 (01) :47-66
[10]  
Chao Lv, 2013, J NETW COMPUT APPL, V36, P298