Abstract

The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.

Highlights

  • Security and privacy issues are fast proliferating the Human-Centered Internet of Things (HCIoT) space [1]

  • Several user authentications and key agreement techniques have been reported for Human-Centered Internet of Things (HC-IoT) systems [2]

  • In order to solve this problem, our work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architectures without a password table

Read more

Summary

Introduction

Security and privacy issues are fast proliferating the Human-Centered Internet of Things (HCIoT) space [1]. The need for secure authenticated key agreement protocols to mitigate the vast security and privacy issues in HC-IoT systems cannot be overemphasized. Several user authentications and key agreement techniques have been reported for HC-IoT systems [2]. HC-IoT devices cannot support ECC operations due to limited storage and computational resources. Authentication schemes can support fast computational processing of user information and low communication costs. Most of these security schemes are susceptible to various attacks and cannot provide critical security requirements [8,9]. In order to solve this problem, our work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architectures without a password table

Motivation
Contribution
Paper Organization
Related Work
Background and Material
Chebyshev Chaotic Maps
Properties of Chaotic Maps
Computational Problems
The Proposed Technique Under the HC-IoT Architecture
The Formal Authentication Proof Using BAN Logic
Suppositions
Verification
Security Analysis and Discussions
Performance Comparisons
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call