An ECC-based enhanced and secured authentication protocol for IoT and cloud server

被引:2
|
作者
Chander, Bhanu [1 ]
Gopalakrishnan, Kumaravelan [1 ]
机构
[1] Pondicherry Univ, Dept Comp Sci & Engn, Pondicherry 609605, India
关键词
internet of things; IoTs; cloud server; one-way hash function; embedded device; fuzzy logic; ECC; security and privacy; KEY AGREEMENT SCHEME; INTERNET;
D O I
10.1504/IJCNDS.2023.131739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the tremendous development in various domains, both internet of things (IoTs) and cloud-based computing are recognised as emerged technologies of the 20th century. IoT collection of heterogeneous interconnected embedded devices, then cloud computing provides the possible infrastructure which could be used at any time and from anywhere. In recent times, due to the advancements in IoT and cloud computing-based devices, mainly their ability to provide remote services, they have been employed in various real-life domains. The integration of IoT with the cloud infrastructure may lead to security issues. Moreover, these IoT-based devices act as a prerequisite for linking through high-resource hubs such as cloud server (CS) for communication and resource sharing. Such a combination comprises security hazards and introduces dishonest data, the principal factors in a system fiasco. In addition, IoT policies are accommodated on public web links, which perturb the secrecy of trustworthy operators. Hence, this article planned an authentication idea on ECC for IoT-based embedded devices with CS. We discover the fuzzy structure facility for channel non-reciprocal, then ECC with one-way hash functions for secure validation. In conclusion, we scrutinise the planned procedure through the AVISPA and related the resource constraints costs with existing authentication procedures.
引用
收藏
页码:407 / 425
页数:20
相关论文
共 50 条
  • [31] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [32] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [33] An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles
    Wang, Jie
    Wang, Shengbao
    Wen, Kang
    Weng, Bosen
    Zhou, Xin
    Chen, Kefei
    ELECTRONICS, 2024, 13 (06)
  • [34] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [35] An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Hoon Jae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 523 - 527
  • [36] ESOTP: ECC-based secure object tracking protocol for IoT communication
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (03)
  • [37] EAAF: ECC-based anonymous authentication framework for cloud-medical system
    Kumari A.
    Kumar V.
    Abbasi M.Y.
    International Journal of Computers and Applications, 2022, 44 (05) : 491 - 500
  • [38] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [39] ECC-based anti-phishing protocol for cloud computing services
    Kalra, Sheetal
    Sood, Sandeep
    International Journal of Security and Networks, 2013, 8 (03) : 130 - 138
  • [40] An high-speed ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, CK
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 401 - 409