Provable Privacy Preserving Authentication Solution for Internet of Things Environment

被引:12
|
作者
Alzahrani, Bander A. [1 ]
Mahmood, Khalid [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
关键词
Protocols; Authentication; Internet of Things; Security; Elliptic curve cryptography; Cryptography; Servers; authentication protocol; mutual authentication; security protocol; ACCESS-CONTROL; IOT; PROTOCOL; SCHEME; SECURE;
D O I
10.1109/ACCESS.2021.3086735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in future and current promising applications of IoT. In these days, the secure communication among interconnected IoT components has become an important issue of concern. Therefore, it has become a foremost need to design such authentication protocol which can make the secure communication among IoT components. In this article, we proposed an identity-based authentication and key agreement protocol for the IoT environment in order to offer the secure communication between various IoT entities. The devised protocol utilizes the physically unclonable function which helps to robustly resist the physical attack on IoT components. We analyze the proposed protocol informally which clearly shows that the proposed protocol offers the perfect forward secrecy, device anonymity and untraceability and also resists the desynchronization, IoT node impersonation and server impersonation attacks. The security features of proposed protocol are also analyzed formally using well known Random Oracle Model (ROM). Moreover, the performance of the devised protocol has also been determined in terms of communication and computational overhead. The performance and security analysis shows the supremacy of the devised protocol over the various related protocols.
引用
收藏
页码:82857 / 82865
页数:9
相关论文
共 50 条
  • [1] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Diksha Rangwani
    Dipanwita Sadhukhan
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    Peer-to-Peer Networking and Applications, 2021, 14 : 1548 - 1571
  • [2] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571
  • [3] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [4] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [5] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (01) : 101 - 116
  • [6] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 101 - 116
  • [7] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [8] A Privacy Preserving Authentication Scheme for Heterogeneous Industrial Internet of Things
    Tan, Zuowen
    Jiao, Jintao
    Yu, Mengjiang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Privacy Preserving Solution for Internet of things with Application to eHealth
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 384 - 391
  • [10] Secure authentication and privacy-preserving blockchain for industrial internet of things
    Sharma, Prakash Chandra
    Mahmood, Md Rashid
    Raja, Hiral
    Yadav, Narendra Singh
    Gupta, Brij B.
    Arya, Varsha
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108