An ECC-based enhanced and secured authentication protocol for IoT and cloud server

被引:2
|
作者
Chander, Bhanu [1 ]
Gopalakrishnan, Kumaravelan [1 ]
机构
[1] Pondicherry Univ, Dept Comp Sci & Engn, Pondicherry 609605, India
关键词
internet of things; IoTs; cloud server; one-way hash function; embedded device; fuzzy logic; ECC; security and privacy; KEY AGREEMENT SCHEME; INTERNET;
D O I
10.1504/IJCNDS.2023.131739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the tremendous development in various domains, both internet of things (IoTs) and cloud-based computing are recognised as emerged technologies of the 20th century. IoT collection of heterogeneous interconnected embedded devices, then cloud computing provides the possible infrastructure which could be used at any time and from anywhere. In recent times, due to the advancements in IoT and cloud computing-based devices, mainly their ability to provide remote services, they have been employed in various real-life domains. The integration of IoT with the cloud infrastructure may lead to security issues. Moreover, these IoT-based devices act as a prerequisite for linking through high-resource hubs such as cloud server (CS) for communication and resource sharing. Such a combination comprises security hazards and introduces dishonest data, the principal factors in a system fiasco. In addition, IoT policies are accommodated on public web links, which perturb the secrecy of trustworthy operators. Hence, this article planned an authentication idea on ECC for IoT-based embedded devices with CS. We discover the fuzzy structure facility for channel non-reciprocal, then ECC with one-way hash functions for secure validation. In conclusion, we scrutinise the planned procedure through the AVISPA and related the resource constraints costs with existing authentication procedures.
引用
收藏
页码:407 / 425
页数:20
相关论文
共 50 条
  • [1] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [2] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [3] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [4] Secure authentication in IoT and cloud server: An ECC based practice
    Chander, Bhanu
    Kumaravelan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05): : 1229 - 1240
  • [5] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [6] ERASMIS: An ECC-based robust authentication protocol suitable for medical IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    Rahmani, Amir Masoud
    Hosseinzadeh, Mehdi
    COMPUTER NETWORKS, 2025, 258
  • [7] An enhanced mutual authentication and security protocol for IoT and cloud server
    Panda, Prabhat Kumar
    Chattopadhyay, Sudipta
    INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 144 - 156
  • [8] Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications
    Gabsi, Souhir
    Kortli, Yassin
    Beroulle, Vincent
    Kieffer, Yann
    Alasiry, Areej
    Hamdi, Belgacem
    IEEE ACCESS, 2021, 9 : 130895 - 130913
  • [9] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [10] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +