Article
Mathematics
Fairuz Shohaimay, Eddie Shahril Ismail
Summary: This research proposes an improved ECC-based authentication scheme with a session key agreement. It solves the infeasible computations and provides a mechanism for the password change/update phase. The proposed scheme achieves mutual authentication and resists privileged insider attacks, suggesting potential applicability of the three hard problems in designing identification and authentication schemes in distributed computer networks.
Article
Automation & Control Systems
Shunfang Hu, Yanru Chen, Yilong Zheng, Bin Xing, Yang Li, Le Zhang, Liangyin Chen
Summary: This article introduces the advanced metering infrastructure (AMI) as a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for ensuring the security of AMI systems. A security-enhanced AKA protocol based on elliptic curve cryptography is proposed and rigorously proven under the random oracle model. Performance comparison demonstrates improved security features with lower computation and communication cost. The proposed scheme is implemented practically on a Raspberry Pi 3 Model B+ testbed for smart meters.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Mariem Bouchaala, Cherif Ghazel, Leila Azouz Saidane
Summary: Password-based authentication is easy to implement but may lack security in large and remote environments like cloud computing, leading to potential attacks. Smart cards offer a solution to enhance security. The proposed protocol aims to implement an anonymous, mutual, and secure two-factor authentication and key agreement scheme in cloud computing environment, utilizing elliptic curve cryptography and fuzzy verifier for security reinforcement.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Sarra Cherbal, Rania Benchetioui
Summary: Internet of Things (IoT) is a growing trend in wireless communication, where connected objects have become a part of our daily lives. However, the openness of the network exposes it to various attacks, making security a major concern. This paper proposes a smart card-based protocol that enables mutual authentication and secure session key establishment using Elliptic curve cryptography (ECC) and lightweight operations. The protocol is evaluated using Burrows-Abadi-Needham (BAN) logic, Scyther verification tool, and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, showing its robustness, suitability for IoT devices, and efficiency compared to other protocols.
COMPUTERS & ELECTRICAL ENGINEERING
(2023)
Article
Computer Science, Software Engineering
Seshu Babu Pulagara, P. J. A. Alphonse
Summary: Smart cities focus on providing necessary services to citizens, while smart vehicles form a network called VANET for data exchange and decision-making. The proposed privacy preserving scheme using elliptic curve cryptography is intelligent, efficient, and easily deployable.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2021)
Article
Energy & Fuels
Feng Zhai, Ting Yang, Wei Sun, Xu Fang
Summary: In this paper, we propose a lightweight and dynamic authenticated key agreement and management protocol for the secure communication between smart meters and electricity service providers in the advanced metering infrastructure of the smart grid. Our protocol, based on identity cryptosystem and elliptic curve cryptography, significantly reduces the computation overhead of resource-constrained smart meters. We also introduce a one-way key tree technique for efficient generation and updating of group keys in multicast communication. Through systematic proof and simulated experiments, we demonstrate that our protocol guarantees message confidentiality, integrity, and resists various attacks.
FRONTIERS IN ENERGY RESEARCH
(2023)
Article
Computer Science, Information Systems
Damandeep Kaur, Devender Kumar
Summary: Smart home technology allows device management through the internet, but insecure communication requires a secure authentication protocol. Shuai et al. proposed a two-factor user authentication protocol for smart homes, but vulnerabilities were identified. A new authentication protocol is proposed to prevent attacks, with formal security analysis and performance comparison demonstrating its reliability and security.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Mingping Qi, Jianhua Chen
Summary: The topic of designing a secure authenticated key agreement protocol for securing smart meter communications in smart grid networks has gained attention. Existing schemes are vulnerable to attacks, leading to the proposal of a new scheme based on Elliptic Curve Qu-Vanstone (ECQV) implicit certificate for improved security and efficiency.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Software Engineering
Khushboo A. Patel, Shivangi Shukla, Sankita J. Patel
Summary: Cloud computing is a paradigm that allows on-demand data storage without considering the limitations of end-users' local infrastructure. With the rapid growth of servers, resources, and networks, security and privacy concerns in clouds have become more intensive. This article analyzes the security of recent authentication protocols, revealing vulnerabilities in some protocols and proposing an enhanced protocol based on fuzzy verifier and elliptic curve cryptography. The proposed protocol provides robust security and privacy functionalities compared to existing protocols.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Editorial Material
Computer Science, Information Systems
Salman Shamshad, Khalid Mahmood, Saru Kumari, Muhammad Khurram Khan
Summary: With the advancement of web services, ensuring the security of applications interacting with Internet users has become a top priority. Insider attacks pose a significant threat, and while new authentication protocols have been introduced to address this, vulnerabilities still exist that require further improvement.
IEEE SYSTEMS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Shehzad Ashraf Chaudhry
Summary: The paper identifies flaws in the PALK authentication scheme proposed by Khan et al., specifically pointing out errors in the login and authentication phases due to superficial ECC operations and issues with the use of public keys in the presence of multiple communicating devices. A solution iPALK is proposed by the authors, which is proven to be secure and correct using formal BAN logic and ProVerif automated tool, with performance comparisons showing iPALK to be more efficient in computation and communication costs compared to PALK.
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
(2021)
Article
Computer Science, Information Systems
Yanru Chen, Fengming Yin, Shunfang Hu, Limin Sun, Yang Li, Bin Xing, Liangyin Chen, Bing Guo
Summary: Nowadays, the progress and extensive use of Industrial Internet of Things (IIoT) technology have brought serious information security threats to the industrial control systems (ICSs). This paper proposes a lightweight authenticated key agreement (AKA) protocol based on the elliptic curve cryptography (ECC) algorithm to adapt to resource-constrained environments. The protocol only uses hash operation, XOR operation, and ECC algorithm for encryption, and avoids involving the register center during key agreement, ensuring both performance and security. Security analysis shows that the protocol meets nine critical security requirements, more than any existing protocols, and performance analysis indicates that it has less computational and communication overhead compared to other similar protocols.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Multidisciplinary Sciences
Yuanyuan Zhang, Zhibo Zhai
Summary: Satellite communication is important in various industries due to its wide coverage and strong disaster tolerance, with security and performance being key concerns. The proposed key agreement scheme ensures anonymity by replacing user's true identity with temporary identity, while demonstrating efficiency and security. Performance analysis shows the proposed scheme is more efficient than other schemes for satellite communication systems.
Article
Computer Science, Information Systems
Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta
Summary: Wireless sensor networks are used to sense data/information and transmit it to a base station for processing, but the limited computation ability and power capacity of sensor nodes pose a challenge for remote user authentication.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Adrian Musuroi, Bogdan Groza, Lucian Popa, Pal-Stefan Murvay
Summary: Research has shown that securely exchanging cryptographic keys between electronic control units on vehicle communication buses has not received enough attention. Evaluation of group extensions of key exchange protocols reveals that computational time is more critical than bandwidth due to demanding elliptic curve operations.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)