Pub Date : 2023-12-12DOI: 10.2174/0126662558274597231204114801
J. Jebrane, S. Lazaar
In the last decades, the development of Internet activities has been significantly accelerated, particularly with the emergence of the Internet of Things (IoT). Heterogeneous devices in the IoT can seamlessly and feasibly inter-connect with each other without human interaction. Due to this revolution, many applications have been adopted in the arena of smart healthcare, e-commerce, environmental and habitat monitoring, etc. In order to promote and facilitate people's standards of living around the world. However, these unbounded applications bring more challenges to the storage capabilities of devices, and their security and privacy preservation. Moreover, security issues suffer from weak authentication protocols. To address these issues, suitable and secure lightweight mutual authentication schemes based on Elliptic Curve Cryptography (ECC) are required for the approval of Identity Management (IDM) of devices in the IoT. In this paper, we will propose an improved mutual authentication scheme based on ECC, coupled with a relevant seminal work considered as a reference in the field. This scheme is combined with U-Quark, a lightweight hash function, to guarantee the security needed in the IoT environment. We will compare our amended protocol with a seminal scheme as an established reference in terms of computation cost, storage cost, and executing CPU time to demonstrate that our version can ensure the most favorable performance during the authentication process. Finally, our proposed mutual authentication scheme has demonstrated its effectiveness in enhancing the security of IoT devices when compared to the seminal work in the same computational environment.
过去几十年来,互联网活动的发展速度明显加快,尤其是随着物联网(IoT)的出现。物联网中的异构设备可以无缝、可行地相互连接,无需人工交互。在这场革命的推动下,智能医疗、电子商务、环境和人居监测等领域出现了许多应用。以促进和便利世界各地人们的生活水平。然而,这些无限制的应用给设备的存储能力及其安全性和隐私保护带来了更多挑战。为了解决这些问题,物联网设备的身份管理(IDM)审批需要基于椭圆曲线加密法(ECC)的合适而安全的轻量级相互验证方案。在本文中,我们将提出一种基于椭圆曲线加密算法的改进型相互验证方案,并结合被视为该领域参考文献的相关开创性工作。我们将在计算成本、存储成本和执行 CPU 时间方面,将我们的改进协议与作为既定参考的开创性方案进行比较,以证明我们的版本能够在验证过程中确保最有利的性能。最后,在相同的计算环境下,与开创性工作相比,我们提出的相互验证方案证明了它在增强物联网设备安全性方面的有效性。
{"title":"ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT\u0000Based on U-Quark Hash Function","authors":"J. Jebrane, S. Lazaar","doi":"10.2174/0126662558274597231204114801","DOIUrl":"https://doi.org/10.2174/0126662558274597231204114801","url":null,"abstract":"\u0000\u0000In the last decades, the development of Internet activities has been\u0000significantly accelerated, particularly with the emergence of the Internet of Things (IoT). Heterogeneous devices in the IoT can seamlessly and feasibly inter-connect with each other without human interaction. Due to this revolution, many applications have been adopted in the arena of smart healthcare, e-commerce, environmental and habitat monitoring, etc. In order to\u0000promote and facilitate people's standards of living around the world. However, these unbounded applications bring more challenges to the storage capabilities of devices, and their security\u0000and privacy preservation. Moreover, security issues suffer from weak authentication protocols.\u0000\u0000\u0000\u0000To address these issues, suitable and secure lightweight mutual authentication\u0000schemes based on Elliptic Curve Cryptography (ECC) are required for the approval of Identity\u0000Management (IDM) of devices in the IoT. In this paper, we will propose an improved mutual\u0000authentication scheme based on ECC, coupled with a relevant seminal work considered as a\u0000reference in the field. This scheme is combined with U-Quark, a lightweight hash function, to\u0000guarantee the security needed in the IoT environment.\u0000\u0000\u0000\u0000We will compare our amended protocol with a seminal scheme as an established reference in terms of computation cost, storage cost, and executing CPU time to demonstrate that\u0000our version can ensure the most favorable performance during the authentication process.\u0000\u0000\u0000\u0000Finally, our proposed mutual authentication scheme has demonstrated its effectiveness in enhancing the security of IoT devices when compared to the seminal work in the\u0000same computational environment.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"10 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139009219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}