Abstract
The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.
Similar content being viewed by others
References
Tsigkanos C, Nastic S, Dustdar S (2019, July) Towards resilient Internet of Things: Vision, challenges, and research roadmap. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1754–1764)
Malik M, Dutta M, Granjal J (2019) A survey of key bootstrapping protocols based on public key cryptography in the internet of things. IEEE Access 7:27443–27464
Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223
Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in iots. In: 4th IEEE International Conference on Signal Processing, Computing and Control (ISPCC) pp 504–509
Sadkhan SB, Salman AO (2018) A survey on lightweight-cryptography status and future challenges. In: IEEE International Conference on Advance of Sustainable Engineering and its Application (ICASEA) pp 105–108
Adat V, Gupta B (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441
El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of internet of things (iot) authentication schemes. Sensors 19(5):1141
Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043
Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270
Zhang Q, Xu D (2020) Security authentication technology based on dynamic bayesian network in internet of things. J Ambient Intell Humaniz Comput 11(2):573–580
Li W, Wang P (2019) Two-factor authentication in industrial internet-of-things: Attacks, evaluation and new construction. Futur Gener Comput Syst 101:694–708
Garg S, Kaur K, Kaddoum G, Choo KKR (2019) Toward secure and provable authentication for internet of things: Realizing industry 4.0. IEEE Internet Things J 7(5):4598–4606
Akram MA, Mahmood K, Kumari S, Xiong H (2020) Comments on toward secure and provable authentication for internet of things: Realizing industry 4.0. IEEE Internet Things J 7(5):4676–4681
Das ML, Kumar P, Martin A (2020) Secure and privacy-preserving rfid authentication scheme for internet of things applications. Wirel Pers Commun 110(1):339–353
Mbarek B, Ge M, Pitner T (2020) An efficient mutual authentication scheme for internet of things. Internet of Things 9:100160
Cui Z, Fei X, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-wsn. IEEE Trans Serv Comput 13(2):241–251
Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal 14:(3)3440–3450
Irshad A, Usman M, Chaudhry SA, Naqvi H, Shafiq, M (2020) A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework. IEEE Transactions on Industry Applications 56(4):4425–4435
Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108
Wan Z, Xu Z, Liu S, Ni W, Ye S (2020) An internet of things roaming authentication protocol based on heterogeneous fusion mechanism. IEEE Access 8:17663–17672
Mandal S, Mohanty S, Majhi B (2020) CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks 1–21
Kumar P, Liyanage M (2020) Efficient and Anonymous Mutual Authentication Protocol in Multi‐Access Edge Computing (MEC) Environments. IoT Security: Advances in Authentication, 119–131
Lara E, Aguilar L, Sanchez MA, García JA (2020) Lightweight authentication protocol for m2m communications of resource-constrained devices in industrial internet of things. Sensors 20(2):501
Alqahtani F, Al-Makhadmeh Z, Tolba A, Said O (2020) Tbm: A trust-based monitoring security scheme to improve the service authentication in the internet of things communications. Comput Commun 150:216–225
Xingliang Z, Shilian X (2012) A new authentication scheme for wireless ad hoc network. IEEE International Conference on Information Management, Innovation Management and Industrial Engineering 2:312–315
Alhakami W, Mansour A, Safdar GA, Albermany S (2013) A secure mac protocol for cognitive radio networks (smcrn). In: 2013 Science and Information Conference pp 796–803
Zhao X, Lv Y, Yeap TH, Hou B (2009) A novel authentication and key agreement scheme for wireless mesh networks. In: Fifth IEEE International Joint Conference on INC, IMS and IDC pp 471–474
Chen H, Ge L, Xie L (2015) A user authentication scheme based on elliptic curves cryptography for wireless ad hoc networks. Sensors 15(7):17057–17075
Chen Y, López L, Martínez JF, Castillejo P (2018) A lightweight privacy protection user authentication and key agreement scheme tailored for the internet of things environment: Lightpriauth. Journal of Sensors
Acknowledgements
The authors extend their appreciation to the Taif University Researchers Supporting Project number, (TURSP-2020/60), Taif University, Taif, Saudi Arabia for funding this work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Thakur, V., Indra, G., Gupta, N. et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. Peer-to-Peer Netw. Appl. 15, 206–220 (2022). https://doi.org/10.1007/s12083-021-01236-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01236-w