期刊
IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 22, 页码 16613-16622出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3075158
关键词
Protocols; Servers; Authentication; Internet of Things; Cryptography; Reliability; Mobile handsets; Anonymity; authentication; Internet of Things (IoT); key agreement; security
资金
- FCT/MCTES
- EU [UIDB/50008/2020]
- Brazilian National Council for Research and Development (CNPq) [313036/2020-9]
- Ministry of Education in Saudi Arabia [IFKSURG-1442-173]
The Internet of Things has brought convenience to mobile services, but it is essential to ensure information security. Current authentication protocols are mostly inadequate for meeting new security requirements, highlighting the need for the development of protocols suitable for the IoT environment.
The Internet of Things (IoT) is a framework of various services and smart technologies that mutually communicate information between mobile devices and users or just between devices with the help of Internet connectivity. The dramatic progression of IoT helps numerous network applications and communication technologies to introduce state-of-the-art communication models for enabling interaction among mobile server, clients, and various other smart entities. Now-a-days, online mobile services have gained huge attention by providing ample convenience to the distant users. However, it is necessary to secure the information, being exchanged among mobile clients and server. Therefore, a large number of authentication protocols have been presented but majority of them are unsuitable to fulfill novel security requirements and standards. Moreover, they are incompatible for the IoT environment due to higher computation and communication complexity. Consequently, there is a dire need of developing an adequate, reliable, and cost-effective authentication protocol. In this article, we introduce a novel identity-based key agreement protocol using the puncturable pseudorandom functions for mobile clients in the IoT environment. The proposed PSK-MC protocol enables two mobile clients to accomplish mutual authentication via server. The proposed protocol is evaluated formally and informally to determine its security strength. The formal security analysis is presented using the widely used random oracle model. Moreover, all the cryptographic operations used at mobile client side are executed on a mobile device, while the operations used at the server side are implemented on a desktop machine to get the experimental results to determine computation cost. The performance analysis reveals the fact that our protocol is comparatively better than related protocols by exhibiting least communication and computation overhead.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据