Ajou University repository

An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devicesoa mark
  • Alzahrani, Bander A. ;
  • Chaudhry, Shehzad Ashraf ;
  • Barnawi, Ahmed ;
  • Al-Barakati, Abdullah ;
  • Shon, Taeshik
Citations

SCOPUS

24

Citation Export

Publication Year
2020-03-01
Publisher
MDPI AG
Citation
Electronics (Switzerland), Vol.9
Keyword
2pakaInternet of thingsInternet of vehiclesKey compromise impersonation attackV2v security
All Science Classification Codes (ASJC)
Control and Systems EngineeringSignal ProcessingHardware and ArchitectureComputer Networks and CommunicationsElectrical and Electronic Engineering
Abstract
Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows-Abadi-Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.
ISSN
2079-9292
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31282
DOI
https://doi.org/10.3390/electronics9030520
Fulltext

Type
Article
Funding
This Project was funded by the Deanship of Scientific Research (DSR), at King Abdulaziz University, Jeddah, under grant no. (RG-7-611-40). The authors, therefore, acknowledge with thanks DSR for technical and financial support. This research was supported by Energy Cloud R&D Program throughthe National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT (2019M3F2A1073386)Funding: This Project was funded by the Deanship of Scientific Research (DSR), at King Abdulaziz University, Jeddah, under grant no. (RG-7-611-40). The authors, therefore, acknowledge with thanks DSR for technical and financial support. This research was supported by Energy Cloud R&D Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT (2019M3F2A1073386).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.