Secure and Efficient Authentication Scheme in IoT Environments
نویسندگان
چکیده
Optimization of resource consumption and decreasing the response time authentication requests is an immense urgent requirement for supporting scalability resources in IoT environments. The existing research attempts to design lightweight protocols address these issues. However, schemes proposed literature are lacking creation a (i.e., low computing, communication, storage cost) secure architecture. devices approaches consume high electricity computing power, despite fact that have limited power capabilities. Furthermore, lead increase burden on memory also create heavy traffic communication channel, increasing device requests. To overcome limitations, we propose novel architecture uses crypto-modules, which optimize usage one-way hash functions, elliptic-curve cryptography, exclusive-or operation. We demonstrate scheme’s security strength using informal analysis verified it by considering widely used automated validation internet protocol application (AVISPA) ProVerif tool. result shows scheme effective against active passive attacks satisfies design. Moreover, calculate working cost implementing accepted standard pairing-based cryptography (PBC) library embedded devices. implementation proves reduces computation 0.933 ms, 1408 bits, 384 removes gaps.
منابع مشابه
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks
The Session Initiation Protocol (SIP) is commonly used to establish Voice over IP (VoIP) calls. Mostly recently, Yoon et al. proposed a new secure and efficient SIP authentication scheme in a converged VoIP network based on ECC. In this paper, we first demonstrate that the recently proposed SIP authentication scheme is insecure against off-line password guessing attacks. Thereafter, we propose ...
متن کاملAn Efficient and Secure Remote Authentication Scheme Using Smart Cards
Security of data communication becomes a crucial challenge due to the rapid development of computer and information technologies. To ensure security of resource transmission, engineers have proposed numerous schemes for protection. Among them, the remote password authentication schemes using smart cards are regarded as very efficient. As a result, smart-card based authentication schemes has bec...
متن کاملAn efficient and secure anonymous mobility network authentication scheme
The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...
متن کاملAn Efficient Dynamic Authentication Scheme for Secure Network Coding
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication schemes for network coding either incur high computation overhead, or are vulnerable to arbitrary collusion among attackers. In this paper, w...
متن کاملComments on a Secure Authentication Scheme for IoT and Cloud Servers
Recently, Kalra and Sood proposed an authentication scheme based on Elliptic Curve Cryptography (ECC) to have embedded devices and cloud servers communicate securely using HTTP cookies. After analyzing their scheme, it is found that there are five issues that are not properly addressed. In this paper, the details and further discussions are given.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2021
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app11031260