An Efficient Privacy-Preserving ID Centric Authentication in IoT Based Cloud Servers for Sustainable Smart Cities

被引:0
作者
Ajay Kumar
Kumar Abhishek
Xuan Liu
Anandakumar Haldorai
机构
[1] NIT,Department of Computer Science and Engineering
[2] Yangzhou University,School of Information Engineering
[3] Sri Eshwar College of Engineering,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2021年 / 117卷
关键词
Smart cities; Smart homes; Authentication; Elliptic curve cryptography (ECC); Security intrusion in smart homes; Security analysis; Wireless management;
D O I
暂无
中图分类号
学科分类号
摘要
Smart cities or Smart societies require Internet of Things (IoT), for connecting numerous devices to enormous asset pools in cloud computing. This coordination of embedded tools plus cloud servers conveys the extensive applicability of IoT in Smart Cities. However, authentication and data protection, play a major job in secure coordination of these two technologies. Considering this, in 2017, Chang et al.s system introduced famous verification system dependent on an elliptic curve cryptography (ECC) for IoT plus cloud servers for Smart Cities and guaranteed that it fulfills need of security protocols and is safe to different sorts of assaults. Nevertheless, in this paper, we demonstrate that Chang et.al. system is defenseless to a privileged insider intrusion, server impersonation intrusion, known session-specific information intrusion and offline password guessing intrusion. In addition, it does not accomplish device anonymity and mutual authentication. Considering this weakness of existing system, we propose an authentication system dependent on ECC for IoT and cloud servers in Smart Cities. The suggested system accomplishes mutual authentication and supports fundamental safety necessities. The informal security examination, performance analysis and contrast of the suggested system with existing systems prove that the suggested method is powerful, effective and stout as a counter to manifold security threats faced by Smart Cities. The formal confirmation of the suggested procedure is performed by AVISPA tools, which affirms its safety strength within the sight of a conceivable invader.
引用
收藏
页码:3229 / 3253
页数:24
相关论文
共 82 条
  • [1] Amin R(2018)A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment Elsevier 78 1005-1019
  • [2] Kumar N(2017)Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things IEEE Internet of Things Journal 5 2884-2895
  • [3] Biswas G(2017)A survey on security and privacy issues in internet-of-things IEEE Internet of Things Journal 4 1250-1258
  • [4] Iqbal R(2017)Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT Applied Sciences 7 1069-112
  • [5] Chang V(2015)A lightweight attribute-based encryption scheme for the Internet of Things Future Generation Computer Systems 49 104-230
  • [6] Roy S(2012)An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security Information Fusion 13 223-146
  • [7] Chatterjee S(2014)A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol Ad Hoc Networks 18 133-112
  • [8] Das AK(2014)A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion Ad Hoc Networks 20 96-176
  • [9] Chattopadhyay S(2016)An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment Ad Hoc Networks 36 152-223
  • [10] Kumari S(2015)Secure authentication scheme for IoT and cloud servers Pervasive and Mobile Computing 24 210-278