Provable Privacy Preserving Authentication Solution for Internet of Things Environment

被引:12
|
作者
Alzahrani, Bander A. [1 ]
Mahmood, Khalid [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
关键词
Protocols; Authentication; Internet of Things; Security; Elliptic curve cryptography; Cryptography; Servers; authentication protocol; mutual authentication; security protocol; ACCESS-CONTROL; IOT; PROTOCOL; SCHEME; SECURE;
D O I
10.1109/ACCESS.2021.3086735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in future and current promising applications of IoT. In these days, the secure communication among interconnected IoT components has become an important issue of concern. Therefore, it has become a foremost need to design such authentication protocol which can make the secure communication among IoT components. In this article, we proposed an identity-based authentication and key agreement protocol for the IoT environment in order to offer the secure communication between various IoT entities. The devised protocol utilizes the physically unclonable function which helps to robustly resist the physical attack on IoT components. We analyze the proposed protocol informally which clearly shows that the proposed protocol offers the perfect forward secrecy, device anonymity and untraceability and also resists the desynchronization, IoT node impersonation and server impersonation attacks. The security features of proposed protocol are also analyzed formally using well known Random Oracle Model (ROM). Moreover, the performance of the devised protocol has also been determined in terms of communication and computational overhead. The performance and security analysis shows the supremacy of the devised protocol over the various related protocols.
引用
收藏
页码:82857 / 82865
页数:9
相关论文
共 50 条
  • [21] Preserving privacy in internet of things: a survey
    Abi Sen A.A.
    Eassa F.A.
    Jambi K.
    Yamin M.
    International Journal of Information Technology, 2018, 10 (2) : 189 - 200
  • [22] A Privacy Preserving Framework for the Internet of Things
    Abou-Tair, Dhiah el Diehn I.
    Buchsenstein, Simon
    Khalifeh, Ala'
    2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2018, : 27 - 31
  • [23] Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things
    Wei, Fushan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Zhang, Ruijie
    Cheng, Qingfeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5599 - 5606
  • [24] Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things
    Rasslan, Mohamed
    Nasreldin, Mahmoud M.
    Aslan, Heba K.
    COMPUTERS & SECURITY, 2022, 119
  • [25] Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
    Rajasekaran, Arun Sekar
    Maria, Azees
    Rajagopal, Maheswar
    Lorincz, Josip
    SENSORS, 2023, 23 (01)
  • [26] An enhanced privacy preserving remote user authentication scheme with provable security
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3782 - 3795
  • [27] Privacy preserving smartcard-based authentication system with provable security
    Byun, Jin Wook
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3028 - 3044
  • [28] Privacy-Aware Authentication in the Internet of Things
    Gross, Hannes
    Hoelbl, Marko
    Slamanig, Daniel
    Spreitzer, Raphael
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 32 - 39
  • [29] An efficient privacy-preserving blockchain storage method for internet of things environment
    Jia, Dayu
    Yang, Guanghong
    Huang, Min
    Xin, Junchang
    Wang, Guoren
    Yuan, George Y.
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (05): : 2709 - 2726
  • [30] An efficient privacy-preserving blockchain storage method for internet of things environment
    Dayu Jia
    Guanghong Yang
    Min Huang
    Junchang Xin
    Guoren Wang
    George Y. Yuan
    World Wide Web, 2023, 26 : 2709 - 2726