EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

被引:0
|
作者
Bahaa Hussein Taher Algubili
Neeraj Kumar
Hongwei Lu
Ali A. Yassin
Rihab Boussada
Alzahraa J. Mohammed
Huiyu Liu
机构
[1] Huazhong University of Science and Technology,Computer Science
[2] University of Basrah,Department of Mathematics, College of Science
[3] Thapar Institute of Engineering and Technology (Deemed University),Department of Computer Science and Engineering
[4] University of Basrah,Department of Computer Science, Education College of Pure Science
[5] SESAME University,undefined
关键词
IoT; Chaotic map; Resource-constrained; Biometric-based authentication; Fuzzy extractor;
D O I
暂无
中图分类号
学科分类号
摘要
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication protocol to reduce security vulnerabilities and attacks that affect the performance of IoT applications. During the last decade, several authentication protocols have been proposed to provide secure communication between remote users and the IoT sensor nodes. Nevertheless, most of these contributions have serious security vulnerabilities and high computational overhead at the IoT sensor node side. In this article, we present a secure three-factor (i.e., password, biometrics, and smart device) user authentication and key agreement protocol (EPSAPI) based on the chaotic maps (CMs) and the fuzzy extractor to reduce the overhead on the IoT sensor node side. It satisfies the required security features and provides efficient communication and computational overheads for a restricted IoT environment. In addition, an informal and formal security analysis, including the Real-Or-Random (ROR) model, Burrows-Abadi-Needham (BAN) logic, and the popular simulation tool Automated Validation of Internet Security Protocols and Applications (AVISPA), concludes that the EPSAPI protocol is provably secure and can withstand all possible well-known attacks. Finally, the presented protocol is better than other recent protocols by performance comparison and it is practical by simulation study through the widely used tool NS-3.
引用
收藏
页码:2179 / 2198
页数:19
相关论文
共 50 条
  • [41] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [42] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [43] Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Yannam, Animi Reddy
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2019, 7 : 55382 - 55397
  • [44] Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle
    Shariq, Mohd
    Conti, Mauro
    Singh, Karan
    Dwivedi, Sanjeev Kumar
    Abdussami, Mohammad
    Amin, Ruhul
    Masud, Mehedi
    COMPUTER COMMUNICATIONS, 2024, 228
  • [45] Secure and Efficient Authentication Scheme in IoT Environments
    Thakare, Abhijeet
    Kim, Young-Gab
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [46] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [47] A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
    Alzahrani, Bander A.
    Irshad, Azeem
    Alsubhi, Khalid
    Albeshri, Aiiad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [48] Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications
    Javadi, Alireza
    Sadeghi, Sadegh
    Pahlevani, Peyman
    Bagheri, Nasour
    Rostampour, Samad
    Bendavid, Ygal
    INTERNET OF THINGS, 2025, 30
  • [49] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [50] A Novel Secure Authentication Protocol for IoT and Cloud Servers
    Iqbal, Ummer
    Tandon, Aditya
    Gupta, Sonali
    Yadav, Arvind R.
    Neware, Rahul
    Gelana, Fraol Waldamichael
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022