当前位置: X-MOL 学术J. Sens. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
Journal of Sensors ( IF 1.4 ) Pub Date : 2020-09-22 , DOI: 10.1155/2020/8829319
Akasha Shafiq 1 , Muhammad Faizan Ayub 1 , Khalid Mahmood 1 , Mazhar Sadiq 1 , Saru Kumari 2 , Chien-Ming Chen 3
Affiliation  

The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applications from any time, anywhere, and any place via the Internet. Due to the open nature of mobile communication and the Internet, these services are extremely susceptible to various malicious attacks, e.g., unauthorized access from malicious intruders. Therefore, to overcome these susceptibilities, a robust authentication scheme is the finest solution. In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services. Our introduced scheme utilizes lightweight elliptic curve cryptography (ECC), hash operations, and XOR operations. The theoretical analysis and formal proof are presented to demonstrate that our scheme provides resistance against several security attacks. Performance evaluation and comparison of our scheme with several related schemes for IoT environment are carried out using the PyCrypto library in Ubuntu and mobile devices. The performance analysis shows that our scheme has trivial storage and communication cost. Hence, the devised scheme is more efficient not only in terms of storage, communication, and computation overheads but also in terms of providing sufficient security against various malicious attacks.

中文翻译:

IoT基础架构的基于身份的匿名第三方认证协议

无线传感器和蜂窝网络领域的快速发展为物联网(IoT)奠定了坚实的基础。物联网已经成为一种新颖的标准,通过允许它们彼此协作来合并各种物理对象。物联网领域中涌现的大量服务和应用程序,包括医疗保健,监视,工业,运输和安全性。服务提供商(SP)提供了几种服务,这些服务可通过Internet随时随地通过智能应用程序访问。由于移动通信和Internet的开放性,这些服务极易遭受各种恶意攻击,例如,来自恶意入侵者的未授权访问。因此,为了克服这些敏感性,可靠的身份验证方案是最好的解决方案。在本文中,我们介绍了用于IoT环境的轻量级基于身份的远程用户身份验证和密钥协商方案,该方案可实现对IoT服务的安全访问。我们介绍的方案利用了轻量级的椭圆曲线加密(ECC),哈希运算和XOR运算。进行了理论分析和形式证明,以证明我们的方案可以抵抗多种安全攻击。使用Ubuntu和移动设备中的PyCrypto库对我们的方案与几种相关的IoT环境方案进行性能评估和比较。性能分析表明,该方案的存储和通信成本很小。因此,设计的方案不仅在存储,通信,
更新日期:2020-09-22
down
wechat
bug