Secure authentication scheme for IoT and cloud servers

被引:173
作者
Kalra, Sheetal [1 ]
Sood, Sandeep K. [2 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Jalandhar 144001, Punjab, India
[2] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Gurdaspur 143521, Punjab, India
关键词
Authentication; Cookies; Cloud computing; Elliptic Curve Cryptography; Internet of Things; PROTOCOL;
D O I
10.1016/j.pmcj.2015.08.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for performing information exchange. Owing to the immense development of this technology, embedded devices are becoming more sophisticated every day and are being deployed in various arenas of life. An important advancement in today's technology is the ability to connect such devices to large resource pools such as cloud. Integration of embedded devices and cloud servers brings wide applicability of IoT in many commercial as well as Government sectors. However, the security concerns such as authentication and data privacy of these devices play a fundamental role in successful integration of these two technologies. Elliptic Curve Cryptography (ECC) based algorithms give better security solutions in comparison to other Public Key Cryptography (PKC) algorithms due to small key sizes and efficient computations. In this paper, a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed. The proposed scheme achieves mutual authentication and provides essential security requirements. The security analysis of the proposed protocol proves that it is robust against multiple security attacks. The formal verification of the proposed protocol is performed using AVISPA tool, which confirms its security in the presence of a possible intruder. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:210 / 223
页数:14
相关论文
共 38 条
[11]   A utility paradigm for IoT: The sensing Cloud [J].
Distefano, Salvatore ;
Merlino, Giovanni ;
Puliafito, Antonio .
PERVASIVE AND MOBILE COMPUTING, 2015, 20 :127-144
[12]  
Granjal J., 2013, IFIP NETW C, P530
[13]   Fortune 1000 companies IS losses in 1998 over $45 billion [J].
Hancock, B .
COMPUTERS & SECURITY, 1999, 18 (07) :553-554
[14]   An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography [J].
He, Debiao ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01) :72-83
[15]   An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security [J].
He Debiao ;
Chen Jianhua ;
Hu Jin .
INFORMATION FUSION, 2012, 13 (03) :223-230
[16]   Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic [J].
Imamoto, Kenji ;
Sakurai, Kouichi .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 135 (01) :79-94
[17]   An analysis of conformance issues in implementations of standardized security protocols [J].
Izquierdo, Antonio ;
Sierra, Jose M. ;
Torres, Joaquin .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) :246-251
[18]   EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications [J].
Jiang, Rong ;
Lai, Chengzhe ;
Luo, Jun ;
Wang, Xiaoping ;
Wang, Hong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[19]  
Kalra S., 2011, INT C ADV COMP ART I, P113
[20]   Survey on secure communication protocols for the Internet of Things [J].
Kim Thuat Nguyen ;
Laurent, Maryline ;
Oualha, Nouha .
AD HOC NETWORKS, 2015, 32 :17-31