Abstract

The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in future and current promising applications of IoT. In these days, the secure communication among interconnected IoT components has become an important issue of concern. Therefore, it has become a foremost need to design such authentication protocol which can make the secure communication among IoT components. In this article, we proposed an identity-based authentication and key agreement protocol for the IoT environment in order to offer the secure communication between various IoT entities. The devised protocol utilizes the physically unclonable function which helps to robustly resist the physical attack on IoT components. We analyze the proposed protocol informally which clearly shows that the proposed protocol offers the perfect forward secrecy, device anonymity and untraceability and also resists the desynchronization, IoT node impersonation and server impersonation attacks. The security features of proposed protocol are also analyzed formally using well known Random Oracle Model (ROM). Moreover, the performance of the devised protocol has also been determined in terms of communication and computational overhead. The performance and security analysis shows the supremacy of the devised protocol over the various related protocols.

Highlights

  • The Internet of Things (IoT) has become an emerging technology which allows to interconnect various devices and machines

  • In this research work, we propose an identity-based lightweight and secure authentication key agreement scheme using PUF for IoT environment

  • 5) Desynchronization Attack In authentication protocol, normally the server keeps some secret credential of user/devices which are frequently updated in every session

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) has become an emerging technology which allows to interconnect various devices and machines. The prediction of CISCO IBSG [6] shows that there will be 50 billion devices connected to the Internet in 2020 In this modern era, along with the significance of IoT technologies, still there are challenges and risks of securing user’s secret data and guarantying their privacy. Kalra and Sood [21] presented an ECC based key agreement and authentication protocol for IoT environment. They [21] declared that their protocol offers basic security features. In this research work, we propose an identity-based lightweight and secure authentication key agreement scheme using PUF for IoT environment

PRELIMINARIES
INFORMAL ANALYSIS
COMPUTATION OVERHEAD
COMMUNICATION OVERHEAD COMPARISON
SECURITY COMPARISON
A1: Resists Cloning and Physical Attacks A2: Resists Desynchronization Attack A3
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.