Provable Secure Anonymous Device Authentication Protocol in IoT Environment

被引:1
|
作者
Ren, Shanyao [1 ,2 ]
Liu, Yizhong [1 ]
Yu, Beiyuan [1 ]
Liu, Jianwei [1 ,2 ]
Li, Dongyu [1 ,3 ,4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Hangzhou 310051, Peoples R China
[3] Tianmushan Lab, Hangzhou 310023, Peoples R China
[4] Shanghai Inst Satellite Engn, Shanghai 201109, Peoples R China
关键词
Authentication scheme; Internet of Things (IoT) devices; real-or-random (ROR) model; KEY EXCHANGE PROTOCOL; USER AUTHENTICATION; INTERNET; NETWORKS; SCHEME;
D O I
10.1109/JIOT.2023.3332943
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inherent massive heterogeneous devices and open channels in the Internet of Things (IoT) present significant challenges for identity authentication between devices and cloud servers. For this issue, reliable protocols ensure the legality of participants and act as a crucial method to provide security for authentication. In previous research, schemes devised by researchers exhibit certain security vulnerabilities, making it challenging to withstand comprehensive network attacks, e.g., stolen device attacks, replay attacks, impersonation, etc. Additionally, some protocols have complex interaction processes, which incur significant computational redundancy and resource loss. Motivated by this, this article proposes an anonymous and certificateless lightweight authentication protocol (ACLAP) for device-to-server and device-to-device based on elliptic curve cryptography. It improves the communication quality between devices and cloud servers and solves the security risks in authentication. In the scheme, we utilize device users' passwords and biometric features as verification credentials without storing any trusted proofs on the cloud server. We address the issue of resource consumption caused by numerous devices in the IoT environment. From formal security analysis and comparisons with other works, our protocol has preferable security performance and effectively saves communication resources for authentication. Simulation results demonstrate the feasibility and practical significance of the scheme.
引用
收藏
页码:12266 / 12277
页数:12
相关论文
共 50 条
  • [21] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [22] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [23] An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (03) : 785 - 800
  • [24] Authentication of IoT Device and IoT Server Using Secure Vaults
    Shah, Trusit
    Venkatesan, S.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 819 - 824
  • [25] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
    Kim, Mijin
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211
  • [26] STAC-Protocol: Secure and Trust Anonymous Communication Protocol for IoT
    Jebri, Sarra
    Abid, Mohamed
    Bouallegue, Ammar
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 365 - 370
  • [27] A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 325 - 329
  • [28] Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security"
    Xu, Meijia
    Dong, Qiying
    Zhou, Mai
    Wang, Chenyu
    Liu, Yangyang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [29] Anonymous chaotic-based identity authentication protocol in IoT
    Long, Jing
    Su, Xin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (02) : 194 - 200
  • [30] A Robust Anonymous Remote User Authentication Protocol for IoT Services
    Meysam Ghahramani
    Reza Javidan
    Wireless Personal Communications, 2021, 121 : 2347 - 2369