Provable Privacy Preserving Authentication Solution for Internet of Things Environment

被引:12
|
作者
Alzahrani, Bander A. [1 ]
Mahmood, Khalid [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
关键词
Protocols; Authentication; Internet of Things; Security; Elliptic curve cryptography; Cryptography; Servers; authentication protocol; mutual authentication; security protocol; ACCESS-CONTROL; IOT; PROTOCOL; SCHEME; SECURE;
D O I
10.1109/ACCESS.2021.3086735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in future and current promising applications of IoT. In these days, the secure communication among interconnected IoT components has become an important issue of concern. Therefore, it has become a foremost need to design such authentication protocol which can make the secure communication among IoT components. In this article, we proposed an identity-based authentication and key agreement protocol for the IoT environment in order to offer the secure communication between various IoT entities. The devised protocol utilizes the physically unclonable function which helps to robustly resist the physical attack on IoT components. We analyze the proposed protocol informally which clearly shows that the proposed protocol offers the perfect forward secrecy, device anonymity and untraceability and also resists the desynchronization, IoT node impersonation and server impersonation attacks. The security features of proposed protocol are also analyzed formally using well known Random Oracle Model (ROM). Moreover, the performance of the devised protocol has also been determined in terms of communication and computational overhead. The performance and security analysis shows the supremacy of the devised protocol over the various related protocols.
引用
收藏
页码:82857 / 82865
页数:9
相关论文
共 50 条
  • [41] Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"
    Akram, Muhammad Arslan
    Mahmood, Khalid
    Kumari, Saru
    Xiong, Hu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4676 - 4681
  • [42] An Overview of Privacy Preserving Schemes for Industrial Internet of Things
    Huo, Yan
    Meng, Chun
    Li, Ruinian
    Jing, Tao
    CHINA COMMUNICATIONS, 2020, 17 (10) : 1 - 18
  • [43] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [44] Privacy-Preserving Redactable Blockchain for Internet of Things
    Ren, Yanli
    Cai, Xianji
    Hu, Mingqi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] Deep Visual Privacy Preserving for Internet of Robotic Things
    Abbasi, Milad Haji
    Majidi, Babak
    Eshghi, Moahmmad
    Abbasi, Ebrahim Haji
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 292 - 296
  • [46] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ikram Ullah
    Munam Ali Shah
    Abdul Wahid
    Amjad Mehmood
    Houbing Song
    Telecommunication Systems, 2018, 67 : 553 - 575
  • [47] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ullah, Ikram
    Shah, Munam Ali
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    TELECOMMUNICATION SYSTEMS, 2018, 67 (04) : 553 - 575
  • [48] Towards Privacy Preserving Data Provenance for the Internet of Things
    Canovas Sanchez, Jose Luis
    Bernal Bernabe, Jorge
    Skarmeta, Antonio F.
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 41 - 46
  • [49] An Overview of Privacy Preserving Schemes for Industrial Internet of Things
    Yan Huo
    Chun Meng
    Ruinian Li
    Tao Jing
    中国通信, 2020, 17 (10) : 1 - 18
  • [50] A Novel Model for Preserving Location Privacy in Internet of Things
    Ullah, Ikram
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 543 - 548