Skip to main content

Advertisement

Log in

Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Tsigkanos C, Nastic S,  Dustdar S (2019, July) Towards resilient Internet of Things: Vision, challenges, and research roadmap. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1754–1764)

  2. Malik M, Dutta M, Granjal J (2019) A survey of key bootstrapping protocols based on public key cryptography in the internet of things. IEEE Access 7:27443–27464

    Article  Google Scholar 

  3. Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223

    Article  Google Scholar 

  4. Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in iots. In: 4th IEEE International Conference on Signal Processing, Computing and Control (ISPCC) pp 504–509

  5. Sadkhan SB, Salman AO (2018) A survey on lightweight-cryptography status and future challenges. In: IEEE International Conference on Advance of Sustainable Engineering and its Application (ICASEA) pp 105–108

  6. Adat V, Gupta B (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441

    Article  Google Scholar 

  7. El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of internet of things (iot) authentication schemes. Sensors 19(5):1141

    Article  Google Scholar 

  8. Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  9. Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270

    Google Scholar 

  10. Zhang Q, Xu D (2020) Security authentication technology based on dynamic bayesian network in internet of things. J Ambient Intell Humaniz Comput 11(2):573–580

    Article  Google Scholar 

  11. Li W, Wang P (2019) Two-factor authentication in industrial internet-of-things: Attacks, evaluation and new construction. Futur Gener Comput Syst 101:694–708

    Article  Google Scholar 

  12. Garg S, Kaur K, Kaddoum G, Choo KKR (2019) Toward secure and provable authentication for internet of things: Realizing industry 4.0. IEEE Internet Things J 7(5):4598–4606

  13. Akram MA, Mahmood K, Kumari S, Xiong H (2020) Comments on toward secure and provable authentication for internet of things: Realizing industry 4.0. IEEE Internet Things J 7(5):4676–4681

  14. Das ML, Kumar P, Martin A (2020) Secure and privacy-preserving rfid authentication scheme for internet of things applications. Wirel Pers Commun 110(1):339–353

    Article  Google Scholar 

  15. Mbarek B, Ge M, Pitner T (2020) An efficient mutual authentication scheme for internet of things. Internet of Things 9:100160

  16. Cui Z, Fei X, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-wsn. IEEE Trans Serv Comput 13(2):241–251

    Google Scholar 

  17. Hammi B, Fayad A, Khatoun R, Zeadally S,  Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal 14:(3)3440–3450

  18. Irshad A, Usman M, Chaudhry SA, Naqvi H, Shafiq, M (2020) A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework. IEEE Transactions on Industry Applications 56(4):4425–4435

  19. Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108

    Article  Google Scholar 

  20. Wan Z, Xu Z, Liu S, Ni W, Ye S (2020) An internet of things roaming authentication protocol based on heterogeneous fusion mechanism. IEEE Access 8:17663–17672

    Article  Google Scholar 

  21. Mandal S, Mohanty S, Majhi B (2020) CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks 1–21

  22. Kumar P, Liyanage M (2020) Efficient and Anonymous Mutual Authentication Protocol in Multi‐Access Edge Computing (MEC) Environments. IoT Security: Advances in Authentication, 119–131

  23. Lara E, Aguilar L, Sanchez MA, García JA (2020) Lightweight authentication protocol for m2m communications of resource-constrained devices in industrial internet of things. Sensors 20(2):501

    Article  Google Scholar 

  24. Alqahtani F, Al-Makhadmeh Z, Tolba A, Said O (2020) Tbm: A trust-based monitoring security scheme to improve the service authentication in the internet of things communications. Comput Commun 150:216–225

    Article  Google Scholar 

  25. Xingliang Z, Shilian X (2012) A new authentication scheme for wireless ad hoc network. IEEE International Conference on Information Management, Innovation Management and Industrial Engineering 2:312–315

    Google Scholar 

  26. Alhakami W, Mansour A, Safdar GA, Albermany S (2013) A secure mac protocol for cognitive radio networks (smcrn). In: 2013 Science and Information Conference pp 796–803

  27. Zhao X, Lv Y, Yeap TH, Hou B (2009) A novel authentication and key agreement scheme for wireless mesh networks. In: Fifth IEEE International Joint Conference on INC, IMS and IDC pp 471–474

  28. Chen H, Ge L, Xie L (2015) A user authentication scheme based on elliptic curves cryptography for wireless ad hoc networks. Sensors 15(7):17057–17075

    Article  Google Scholar 

  29. Chen Y, López L, Martínez JF,  Castillejo P (2018) A lightweight privacy protection user authentication and key agreement scheme tailored for the internet of things environment: Lightpriauth. Journal of Sensors

Download references

Acknowledgements

The authors extend their appreciation to the Taif University Researchers Supporting Project number, (TURSP-2020/60), Taif University, Taif, Saudi Arabia for funding this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Gupta.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakur, V., Indra, G., Gupta, N. et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. Peer-to-Peer Netw. Appl. 15, 206–220 (2022). https://doi.org/10.1007/s12083-021-01236-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01236-w

Keywords

Navigation