An ECC-based enhanced and secured authentication protocol for IoT and cloud server

被引:2
|
作者
Chander, Bhanu [1 ]
Gopalakrishnan, Kumaravelan [1 ]
机构
[1] Pondicherry Univ, Dept Comp Sci & Engn, Pondicherry 609605, India
关键词
internet of things; IoTs; cloud server; one-way hash function; embedded device; fuzzy logic; ECC; security and privacy; KEY AGREEMENT SCHEME; INTERNET;
D O I
10.1504/IJCNDS.2023.131739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the tremendous development in various domains, both internet of things (IoTs) and cloud-based computing are recognised as emerged technologies of the 20th century. IoT collection of heterogeneous interconnected embedded devices, then cloud computing provides the possible infrastructure which could be used at any time and from anywhere. In recent times, due to the advancements in IoT and cloud computing-based devices, mainly their ability to provide remote services, they have been employed in various real-life domains. The integration of IoT with the cloud infrastructure may lead to security issues. Moreover, these IoT-based devices act as a prerequisite for linking through high-resource hubs such as cloud server (CS) for communication and resource sharing. Such a combination comprises security hazards and introduces dishonest data, the principal factors in a system fiasco. In addition, IoT policies are accommodated on public web links, which perturb the secrecy of trustworthy operators. Hence, this article planned an authentication idea on ECC for IoT-based embedded devices with CS. We discover the fuzzy structure facility for channel non-reciprocal, then ECC with one-way hash functions for secure validation. In conclusion, we scrutinise the planned procedure through the AVISPA and related the resource constraints costs with existing authentication procedures.
引用
收藏
页码:407 / 425
页数:20
相关论文
共 50 条
  • [41] A secure ECC-based mobile RFID mutual authentication protocol and its application
    Chiou, Shin-Yan
    Ko, Wen-Tsai
    Lu, Erl-Huei
    International Journal of Network Security, 2018, 20 (02): : 396 - 402
  • [42] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [43] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Yao, Hailong
    Yan, Qiao
    Fu, Xingbing
    Zhang, Zhibin
    Lan, Caihui
    SOFT COMPUTING, 2022, 26 (09) : 4441 - 4461
  • [44] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Hailong Yao
    Qiao Yan
    Xingbing Fu
    Zhibin Zhang
    Caihui Lan
    Soft Computing, 2022, 26 : 4441 - 4461
  • [45] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shukla, Shivangi
    Patel, Sankita J.
    COMPUTING, 2022, 104 (05) : 1173 - 1202
  • [46] Multi Server Authentication System Based on Finger Print and Secured OTP using ECC
    Mythili, S.
    Nirmalrani, V
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 408 - 416
  • [47] Secure Lightweight ECC-Based Protocol for Multi-Agent IoT Systems
    Hasan, Haya
    Salah, Tasneem
    Shehada, Dina
    Zemerly, M. Jamal
    Yeun, Chan Yeob
    Al-Qutayri, Mahmoud
    Al-Hammadi, Yousof
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 692 - 699
  • [48] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shivangi Shukla
    Sankita J. Patel
    Computing, 2022, 104 : 1173 - 1202
  • [49] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [50] High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, ÇK
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (05): : 273 - 279