An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

نویسندگان

چکیده

Abstract With the widespread use of Internet Things and cloud computing in smart cities, various security privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices, distributed servers, centers, etc. In 2020, Kang et al. improved an protocol for IoT-Enabled devices a environment its main purpose was order to prevent counterfeiting attacks Amin al.’ protocol, which published 2018. However, We found that al.’s still has fatal vulnerability, is, it attacked by offline password guessing, malicious users can easily obtain master key control server. this article, we extend their work design lightweight pseudonym identity based agreement using card. For illustrating our used analysis tools AVISPA Scyther prove defend against existing attacks. will further analyze interaction participants path ensure protection from simulated detailedly. addition, on comparison functions performance, superior other two related protocols. As result, enhanced efficient secure architecture city.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Authentication and Key Agreement Protocol in RFID System

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

متن کامل

An Efficient ECC-based Authentication and Key Agreement Protocol

Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Ironwood Meta Key Agreement and Authentication Protocol

Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...

متن کامل

Efficient remote mutual authentication and key agreement

A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167–73] proposed a mutual authentication scheme using smart cards. The advantages in the scheme include freely chosen passwords, no verification tables, low communication and computation cost, and ses...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Eurasip Journal on Wireless Communications and Networking

سال: 2021

ISSN: ['1687-1499', '1687-1472']

DOI: https://doi.org/10.1186/s13638-021-02022-1