A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor

A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor

Sebbah Abderrezzak, Kadri Benamar
Copyright: © 2022 |Pages: 22
DOI: 10.4018/IJTD.313643
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of things offers a rich set of options and applications in different fields, such as smart home, agriculture, security, transportation, and health issues. The IoT aims at organizing the interactions between items that are both sensors and actuators, known as objects. These objects acquire new applications in our lives that facilitate the remote control of smart devices via the open channel. However, this makes the sensitive transmitted data easily reachable and vulnerable to many attacks. With this in mind, security and privacy become an essential requirement that precedes the deployment of any IoT network. In this paper, the authors provide an IoT authentication and key agreement scheme using ECC and a fuzzy extractor and then they use BAN logic model and AVISPA tool to demonstrate the security of the scheme. They show that the proposed scheme is resistant to various attacks. Furthermore, the security analysis of the proposed scheme and its comparison with some other related works have shown that the proposed scheme is both more efficient and more secure than the other ones.
Article Preview
Top

In a previous work, a two-factor user authentication was introduced by Das (2009) in the field of wireless sensor networks with only the hash function, providing only authentication and creation of session keys. Subsequently, the works of Khan et al. (2010), and Yeh et al. (2011) found weaknesses in the scheme of (Das, 2009) which did not provide mutual authentication and was vulnerable to insider attacks and forgery attacks. Later on, Shi et al. (2013) presented a protocol that is more secure and performs more efficiently than Yeh et al.’s scheme.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing