Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

16.10.2019

A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things

verfasst von: Mohammad Nikravan, Akram Reza

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide interactive communication between various processing object via heterogeneous networks. By increasing the IoT usage, establishing the security of IoT becomes a big concern. One of the security related issues is user authentication; that means before a user can access to the IoT nodes, the user and IoT node must authenticate each other. In this paper, a multi-factor user authentication and key agreement protocol, with reasonable computational time, applicable for IoT environments is proposed. To gain access to the services provided by IoT nodes, first, the gateway must authenticate the user and then, with help of the gateway, the IoT node can authenticate the user. The proposed protocol uses elliptic curve cryptography (ECC) and provides: (1) mutual authentication between the user and IOT node; (2) fresh shared session key; (3) multi-factor authentication; (4) several security requirements (i.e., non-repudiation, anonymity and untraceability, etc.). Formal verification of the proposed protocol using Burrows–Abadi–Needham logic shows that the protocol achieves the desired goals. Protocol simulation using Internet Security Protocols and Applications tool proves the security and robustness of the proposed protocol against well-known attacks. Finally, comparing the proposed protocol with other protocols shows that it is efficient in terms of computational time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Sarvabhatla, M., & Vorugunti, C. S. (2014). A secure biometric‐based user authentication scheme for heterogeneous WSN. In 2014 Fourth international conference of emerging applications of information technology (pp. 367–372). IEEE. https://doi.org/10.1109/eait.2014.23. Sarvabhatla, M., & Vorugunti, C. S. (2014). A secure biometric‐based user authentication scheme for heterogeneous WSN. In 2014 Fourth international conference of emerging applications of information technology (pp. 367–372). IEEE. https://​doi.​org/​10.​1109/​eait.​2014.​23.
27.
28.
Zurück zum Zitat Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2012). A DTLS based end‐to‐end security architecture for the internet of things with two‐way authentication. In Proceedings of 37th conference on local computer networks workshops (pp. 956–963). IEEE. https://doi.org/10.1109/lcnw.2012.6424088. Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2012). A DTLS based end‐to‐end security architecture for the internet of things with two‐way authentication. In Proceedings of 37th conference on local computer networks workshops (pp. 956–963). IEEE. https://​doi.​org/​10.​1109/​lcnw.​2012.​6424088.
43.
Zurück zum Zitat Barreto, P. S., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In International conference on the theory and application of cryptology and information security (pp. 515–532). Springer. https://doi.org/10.1007/11593447_28. Barreto, P. S., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In International conference on the theory and application of cryptology and information security (pp. 515–532). Springer. https://​doi.​org/​10.​1007/​11593447_​28.
Metadaten
Titel
A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
verfasst von
Mohammad Nikravan
Akram Reza
Publikationsdatum
16.10.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06869-y

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt