Article
Computer Science, Information Systems
Shreeya Swagatika Sahoo, Sujata Mohanty, Kshira Sagar Sahoo, Mahmoud Daneshmand, Amir H. Gandomi
Summary: The Internet of Things (IoT) is a growing technology that allows physical devices to connect with each other over a public channel. The security of 5G with IoT has been a focus of research. An existing IoT-based authentication scheme was found to have flaws in user anonymity, session key security, authentication in the login phase, and password update phase. To address these weaknesses, we propose an improved three-factor-based data transmission authentication scheme (TDTAS). Formal security analysis using the Real-or-Random (RoR) model and informal security analysis demonstrate that the proposed scheme is secure against known attacks and offers more security features. Furthermore, comparison with other schemes shows that our proposed scheme has lower communication and storage costs.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
Summary: This paper proposes a mutual authentication scheme based on elliptic curve cryptography for RFID technology in the IoT. The scheme has lower computational costs, lower communication costs, and less elliptic curve point multiplication time compared to similar protocols. It also addresses the security shortcomings of the RFID authentication protocol.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
(2022)
Article
Automation & Control Systems
S. Velliangiri, Rajesh Manoharn, Sitharthan Ramachandran, Krishnasamy Venkatesan, Vani Rajasekar, P. Karthikeyan, Pardeep Kumar, Abhishek Kumar, Shanmuga Sundar Dhanabalan
Summary: Industry 4.0, the trend of automation and data interchange in industrial technology, is improving distribution networks to be more responsive and efficient. Implementing IoT devices in Industry 4.0 scenarios faces challenges due to limited infrastructure, requiring a lightweight and effective security solution. This study proposes a flexible authentication method and evaluates its efficiency through experimental analysis.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Vidyotma Thakur, Gaurav Indra, Nitin Gupta, Pushpita Chatterjee, Omar Said, Amr Tolba
Summary: The study proposes a cryptographically secure privacy-preserving authenticated key agreement scheme based on elliptic curve to generate a mutual key between the user and the device. Systematic testing and security review of the scheme show that it is lightweight and effective, providing additional security features.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Dipanwita Sadhukhan, Sangram Ray, G. P. Biswas, M. K. Khan, Mou Dasgupta
Summary: The development of IoT technology has made IoT services more reliable. In order to ensure secure data transmission between remote users and IoT networks, this research proposes a secure authentication scheme and verifies its reliability through multiple cryptographic attacks.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Theory & Methods
Uddalak Chatterjee, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen
Summary: Fog computing, a distributed computing structure, offers better performance than cloud computing due to its low latency, low communication overhead, and real-time application support. However, it inherits security and privacy issues from cloud computing. This paper analyzes the SAKA-FC protocol and proposes an improved authentication scheme to address its security shortcomings. The proposed scheme is proven to prevent all relevant security threats through mathematical security analysis and simulation.
Article
Computer Science, Information Systems
Abderrazak Abdaoui, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, Mohsen Guizani
Summary: This article presents a novel method of authentication and encryption for IoT systems based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. The method is evaluated using standard randomness tests and compared to existing ECC based on shift registers, demonstrating superior performance.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yanru Chen, Fengming Yin, Shunfang Hu, Limin Sun, Yang Li, Bin Xing, Liangyin Chen, Bing Guo
Summary: Nowadays, the progress and extensive use of Industrial Internet of Things (IIoT) technology have brought serious information security threats to the industrial control systems (ICSs). This paper proposes a lightweight authenticated key agreement (AKA) protocol based on the elliptic curve cryptography (ECC) algorithm to adapt to resource-constrained environments. The protocol only uses hash operation, XOR operation, and ECC algorithm for encryption, and avoids involving the register center during key agreement, ensuring both performance and security. Security analysis shows that the protocol meets nine critical security requirements, more than any existing protocols, and performance analysis indicates that it has less computational and communication overhead compared to other similar protocols.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Theory & Methods
AmirHossein Ghafouri Mirsaraei, Ali Barati, Hamid Barati
Summary: This paper proposes a three-factor-based authentication scheme for the IoT on the blockchain platform. The scheme utilizes smart card registration for user authorization and implements mutual authentication without the need for a trustable server. It has been shown to be secure and efficient in terms of computational and communications costs.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Editorial Material
Computer Science, Information Systems
Salman Shamshad, Khalid Mahmood, Saru Kumari, Muhammad Khurram Khan
Summary: With the advancement of web services, ensuring the security of applications interacting with Internet users has become a top priority. Insider attacks pose a significant threat, and while new authentication protocols have been introduced to address this, vulnerabilities still exist that require further improvement.
IEEE SYSTEMS JOURNAL
(2021)
Article
Engineering, Multidisciplinary
Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, Muhammad Khurram Khan
Summary: Elliptic Curve Cryptography (ECC)-based authentication schemes have emerged as a safe and efficient option for RFID environments. However, limited resources in passive tags make practical implementation difficult. This study presents a key-less scheme based on the Elliptic Curve Discrete Logarithm Problem (ECDLP), enabling efficient authentication in Warehouse Management Systems (WMS) while reducing memory usage and computation costs.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Telecommunications
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta
Summary: CoAP is an application layer protocol used for communication between lightweight resource-constrained devices, associated with UDP and based on REST architecture, establishes secure sessions through DTLS protocol. ECC-CoAP utilizes elliptic curve cryptography for secure authentication between IoT devices and servers, providing high security strength and lightweight performance.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Chemistry, Analytical
Yu-Sheng Yang, Shih-Hsiung Lee, Jie-Min Wang, Chu-Sing Yang, Yuen-Min Huang, Ting-Wei Hou
Summary: With the promotion of Industry 4.0, factories have introduced many Internet of Things (IoT) devices for data collection and monitoring. However, the transmission environment is vulnerable to security issues. This study proposes an authentication mechanism based on elliptic curve cryptography and trusted tokens to ensure the source and correctness of data transmission.
Article
Chemistry, Multidisciplinary
Abhijeet Thakare, Young-Gab Kim
Summary: Optimizing resource consumption and reducing response time of authentication requests are urgent needs for supporting scalability in IoT environments. Existing lightweight authentication protocols lack a secure architecture that is both lightweight and cost-effective. The proposed novel architecture effectively addresses limitations of high power consumption, storage burden, and slow response times in existing approaches, providing security against active and passive attacks. Implementation on embedded devices using PBC library shows significant reductions in computation, communication, and storage costs, demonstrating the effectiveness of the proposed scheme.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Information Systems
Susmita Mandal
Summary: Wireless body area networks are becoming popular for their innovative applications and the need for security and privacy in healthcare systems. This paper proposes a secure remote healthcare system based on elliptic curve cryptosystem, achieving confidentiality and privacy of sensitive information. The scheme guarantees anonymity, resistance to key escrow problems, and mutual authentication between sensor nodes and application provider, and is formally analyzed for security using the random oracle model and validated using ProVerif. Performance analysis shows the proposed scheme is more efficient compared to existing methods.