首页> 外文OA文献 >An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
【2h】

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

机译:基于IOT基础结构的一个基于身份的匿名三方经过验证协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applications from any time, anywhere, and any place via the Internet. Due to the open nature of mobile communication and the Internet, these services are extremely susceptible to various malicious attacks, e.g., unauthorized access from malicious intruders. Therefore, to overcome these susceptibilities, a robust authentication scheme is the finest solution. In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services. Our introduced scheme utilizes lightweight elliptic curve cryptography (ECC), hash operations, and XOR operations. The theoretical analysis and formal proof are presented to demonstrate that our scheme provides resistance against several security attacks. Performance evaluation and comparison of our scheme with several related schemes for IoT environment are carried out using the PyCrypto library in Ubuntu and mobile devices. The performance analysis shows that our scheme has trivial storage and communication cost. Hence, the devised scheme is more efficient not only in terms of storage, communication, and computation overheads but also in terms of providing sufficient security against various malicious attacks.
机译:无线传感器和蜂窝网络领域的快速进步已经为事物互联网(物联网)建立了刚性基础。 IOT已成为一种新的标准,可以通过允许它们彼此合作来融合各种物理物体。在IOT领域出现的大量服务和应用,包括医疗保健,监控,行业,运输和安全性。服务提供商(SP)提供了几种服务,可通过互联网的任何时间,任何地方通过智能应用程序访问。由于移动通信和互联网的开放性,这些服务极大易于各种恶意攻击,例如,从恶意入侵者的未经授权访问。因此,为了克服这些敏感性,强大的认证方案是最优质的解决方案。在本文中,我们为IOT环境引入了基于轻量级的远程用户身份验证和密钥协议方案,可以安全访问IOT服务。我们的介绍方案利用轻质椭圆曲线密码(ECC),散列操作和XOR操作。提出了理论分析和正式证明,以证明我们的计划提供了对若干安全攻击的抵抗力。使用Ubuntu和移动设备中的Pycrypto库进行了具有几种相关方案的绩效评估和比较了我的IOT环境的相关方案。性能分析表明,我们的计划具有琐碎的储存和沟通成本。因此,设计方案不仅可以在存储,通信和计算开销方面更有效,而且还借助针对各种恶意攻击提供足够的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号