4.5 Article

A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

Journal

JOURNAL OF SUPERCOMPUTING
Volume 78, Issue 4, Pages 5903-5930

Publisher

SPRINGER
DOI: 10.1007/s11227-021-04114-7

Keywords

Multi-server environment; Mutual authentication; Key agreement; Group key; Security

Ask authors/readers for more resources

The use of Internet-of-Things (IoT)-based wireless applications is increasing exponentially, requiring efficient management of large volumes of traffic. To address the performance bottleneck of traditional single-server architecture, a lightweight Mutual Authentication and Key Agreement (MAKA) protocol based on group keys is introduced for multi-server environments, improving energy efficiency and security of the system.
Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic needs to be managed at the application server. In such scenario, the traditional single-server architecture shows serious performance bottleneck and needs to be replaced by multiple servers. In addition, several security and design vulnerabilities may arise while accessing application data through various resource-constraint mobile devices. Thus, ensuring entity authentication, application data confidentiality and energy-efficient computations are essential. In this article, we introduce a group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment. The proposed protocol is designed using low-cost cryptographic primitives (such as hash function and symmetric key encryption/decryption) to address energy-efficiency requirements of the resource-constraint mobile devices. It reduces computational burden of the registration center by distributing the traffic load into a group of servers. Additionally, registration center needs not to maintain one-to-one communication with its users whenever a new server is added to the system. The protocol achieves various security and design properties which are verified both formally and informally. Finally, we compare our protocol with others to show its applicability in real-life implementations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available