A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things

被引:49
作者
Nikravan, Mohammad [1 ]
Reza, Akram [1 ]
机构
[1] Islamic Azad Univ, Shahr E Qods Branch, Dept Comp Engn, Tehran, Iran
关键词
Internet of things; Security management; User authentication; Key agreement; Biometrics; Digital signatures; WIRELESS SENSOR NETWORKS; SCHEME; SECURITY;
D O I
10.1007/s11277-019-06869-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide interactive communication between various processing object via heterogeneous networks. By increasing the IoT usage, establishing the security of IoT becomes a big concern. One of the security related issues is user authentication; that means before a user can access to the IoT nodes, the user and IoT node must authenticate each other. In this paper, a multi-factor user authentication and key agreement protocol, with reasonable computational time, applicable for IoT environments is proposed. To gain access to the services provided by IoT nodes, first, the gateway must authenticate the user and then, with help of the gateway, the IoT node can authenticate the user. The proposed protocol uses elliptic curve cryptography (ECC) and provides: (1) mutual authentication between the user and IOT node; (2) fresh shared session key; (3) multi-factor authentication; (4) several security requirements (i.e., non-repudiation, anonymity and untraceability, etc.). Formal verification of the proposed protocol using Burrows-Abadi-Needham logic shows that the protocol achieves the desired goals. Protocol simulation using Internet Security Protocols and Applications tool proves the security and robustness of the proposed protocol against well-known attacks. Finally, comparing the proposed protocol with other protocols shows that it is efficient in terms of computational time.
引用
收藏
页码:463 / 494
页数:32
相关论文
共 48 条
[1]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[2]   Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
An, Younghwa .
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
[3]  
[Anonymous], 2001, ANN INT CRYPTOLOGY C
[4]  
[Anonymous], 2006, 2006200 CRYPT EPRINT
[5]   A New Certificateless and Secure Authentication Scheme for Ad hoc Networks [J].
Bakhtiari-Chehelcheshmeh, Shaghayegh ;
Hosseinzadeh, Mehdi .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) :2833-2851
[6]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[7]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[8]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[9]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[10]   Notes on "Secure authentication scheme for IoT and cloud servers" [J].
Chang, Chin-Chen ;
Wu, Hsiao-Ling ;
Sun, Chin-Yu .
PERVASIVE AND MOBILE COMPUTING, 2017, 38 :275-278