An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and...

Full description

Bibliographic Details
Main Authors: Akasha Shafiq, Muhammad Faizan Ayub, Khalid Mahmood, Mazhar Sadiq, Saru Kumari, Chien-Ming Chen
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Journal of Sensors
Online Access:http://dx.doi.org/10.1155/2020/8829319
id doaj-7d21f9fb3ccc4ad2b434c5a0ec3d0adb
record_format Article
spelling doaj-7d21f9fb3ccc4ad2b434c5a0ec3d0adb2020-11-25T03:55:09ZengHindawi LimitedJournal of Sensors1687-725X1687-72682020-01-01202010.1155/2020/88293198829319An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT InfrastructureAkasha Shafiq0Muhammad Faizan Ayub1Khalid Mahmood2Mazhar Sadiq3Saru Kumari4Chien-Ming Chen5Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, PakistanDepartment of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, PakistanDepartment of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, PakistanDepartment of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, PakistanDepartment of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250004, IndiaCollege of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, ChinaThe rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applications from any time, anywhere, and any place via the Internet. Due to the open nature of mobile communication and the Internet, these services are extremely susceptible to various malicious attacks, e.g., unauthorized access from malicious intruders. Therefore, to overcome these susceptibilities, a robust authentication scheme is the finest solution. In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services. Our introduced scheme utilizes lightweight elliptic curve cryptography (ECC), hash operations, and XOR operations. The theoretical analysis and formal proof are presented to demonstrate that our scheme provides resistance against several security attacks. Performance evaluation and comparison of our scheme with several related schemes for IoT environment are carried out using the PyCrypto library in Ubuntu and mobile devices. The performance analysis shows that our scheme has trivial storage and communication cost. Hence, the devised scheme is more efficient not only in terms of storage, communication, and computation overheads but also in terms of providing sufficient security against various malicious attacks.http://dx.doi.org/10.1155/2020/8829319
collection DOAJ
language English
format Article
sources DOAJ
author Akasha Shafiq
Muhammad Faizan Ayub
Khalid Mahmood
Mazhar Sadiq
Saru Kumari
Chien-Ming Chen
spellingShingle Akasha Shafiq
Muhammad Faizan Ayub
Khalid Mahmood
Mazhar Sadiq
Saru Kumari
Chien-Ming Chen
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
Journal of Sensors
author_facet Akasha Shafiq
Muhammad Faizan Ayub
Khalid Mahmood
Mazhar Sadiq
Saru Kumari
Chien-Ming Chen
author_sort Akasha Shafiq
title An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
title_short An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
title_full An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
title_fullStr An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
title_full_unstemmed An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
title_sort identity-based anonymous three-party authenticated protocol for iot infrastructure
publisher Hindawi Limited
series Journal of Sensors
issn 1687-725X
1687-7268
publishDate 2020-01-01
description The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applications from any time, anywhere, and any place via the Internet. Due to the open nature of mobile communication and the Internet, these services are extremely susceptible to various malicious attacks, e.g., unauthorized access from malicious intruders. Therefore, to overcome these susceptibilities, a robust authentication scheme is the finest solution. In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services. Our introduced scheme utilizes lightweight elliptic curve cryptography (ECC), hash operations, and XOR operations. The theoretical analysis and formal proof are presented to demonstrate that our scheme provides resistance against several security attacks. Performance evaluation and comparison of our scheme with several related schemes for IoT environment are carried out using the PyCrypto library in Ubuntu and mobile devices. The performance analysis shows that our scheme has trivial storage and communication cost. Hence, the devised scheme is more efficient not only in terms of storage, communication, and computation overheads but also in terms of providing sufficient security against various malicious attacks.
url http://dx.doi.org/10.1155/2020/8829319
work_keys_str_mv AT akashashafiq anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT muhammadfaizanayub anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT khalidmahmood anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT mazharsadiq anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT sarukumari anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT chienmingchen anidentitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT akashashafiq identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT muhammadfaizanayub identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT khalidmahmood identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT mazharsadiq identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT sarukumari identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
AT chienmingchen identitybasedanonymousthreepartyauthenticatedprotocolforiotinfrastructure
_version_ 1715087144426405888