Skip to main content

Secure Authentication Key Agreement Protocol with eCK Model in Heterogeneous IoT Environment

  • Conference paper
  • First Online:
Security with Intelligent Computing and Big-Data Services 2019 (SICBS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1145))

  • 331 Accesses

Abstract

Internet of Things (IoT) has been developed increasingly and is a next wave in the era of computing. IoT is the concept in which many of the objects are getting networked and connected anytime and anyplace. It uses any network and any service in a heterogeneous circumstance. According to recent research, it is estimated nearly 30 billion devices on IoT; therefore, the security issues on IoT turn into a vital fundamental in present tendency. Although IoT brought convenience life, most existing IoT devices were controlled by multiple units (or parties), including owners, employees, and maintenance vendors. Distinct units may join different Certificate Authorities (CAs) for the public key management. How to share a common session key between IoT devices certified by distinct CAs is a practical issue worth to be studied. Therefore, we propose an authentication key agreement protocol using elliptic curve algorithm with extended Canetti-Krawczyk (eCK) security that can solve heterogeneous IoT session key problem for distinct CAs and satisfies all security requirements of AKA protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology CRYPTO 1993, pp. 110–125. Springer (1993)

    Google Scholar 

  2. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)

    Google Scholar 

  3. Chen, L., Lim, H.W., Yang, G.: Cross-domain password-based authenticated key exchange revisited. In: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), pp. 1052–1060 (2013)

    Google Scholar 

  4. Chen, L., Kudla, C.: Identity-based authenticated key agreement protocols from pairings. In: Proceeding of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233. IEEE Computer Society Press (2003)

    Google Scholar 

  5. Cheng, Q.F., Han, G.G., Ma, C.G.: A new efficient and strongly secure authenticated key exchange protocol. In: Fifth International Conference on Information Assurance and Security, pp. 499–502 (2009)

    Google Scholar 

  6. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. LNCS, vol. 2045, pp. 453–474. Springer (2001)

    Google Scholar 

  7. Da, B., Esnault, P.P., Hu, S.H., Wang, C.: Identity/identifier-enabled networks (IDEAS) for Internet of Things (IoT). In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 412–415 (2018)

    Google Scholar 

  8. Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  9. Farash, M.S., Attari, M.A.: An ID-based key agreement protocol based on ECC among users of separate networks. In: 9th International ISC Conference on Information Security and Cryptology, pp. 32–37 (2012)

    Google Scholar 

  10. Farash, M.S., Attari, M.A.: Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int. J. Inf. Secur. 5(1), 1–16 (2013)

    Google Scholar 

  11. Farash, M.S., Attari, M.A.: A pairing-free ID-based key agreement protocol with different PKGs. Int. J. Netw. Secur. 16(3), 168–173 (2014)

    Google Scholar 

  12. Hu, X.X., Cheng, Q.F., Liu, W.F., Zhang, Q.H.: A new AKE protocol with stronger security in the eCK model. In: WASE International Conference on Information Engineering, vol. 4, pp. 10–13 (2010)

    Google Scholar 

  13. Krawczyk, H.: A high-performance secure Diffie-Hellman protocol. In: Advances in Cryptology - CRYPTO 2005, LNCS, vol. 3621, pp. 546–566. Springer (2005)

    Google Scholar 

  14. Koblitz, N.: Elliptic curve cryptosystem. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  15. Kushwaha, P.: Towards the equivalence of Diffie-Hellman problem and discrete logarithm problem for important elliptic curves used in practice. ISEA Asia Security and Privacy (ISEASP), pp. 1–4 (2017)

    Google Scholar 

  16. Kumari, P.L.S., Damodaram, A.: An alternative methodology for authentication and confidentiality based on zero knowledge protocols using Diffie-Hellman key exchange. In: 2014 International Conference on Information Technology (ICIT), pp. 368–373 (2014)

    Google Scholar 

  17. Kim, S., Lee, H., Oh, H.: Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In: Proceedings of ICICS, pp. 323–335. Springer (2005)

    Google Scholar 

  18. LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)

    Google Scholar 

  19. Lee, H., Kim, D., Kim, S., Oh, H.: Identity-based key agreement protocols in a multiple PKG environment. In: Proceedings of the International Conference on Computer Science and its Applications, ICCSA. LNCS, vol. 3483, pp. 877–886. Springer (2005)

    Google Scholar 

  20. Miladinovic, I., Schefer-Wenzl, S.: NFV enabled IoT architecture for an operating room environment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 98–102 (2018)

    Google Scholar 

  21. Mehibel, N., Hamadouche, M.: A new approach of elliptic curve Diffie-Hellman key exchange. In: 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B), pp. 1–6 (2017)

    Google Scholar 

  22. Miller, V.S.: Uses of elliptic curve in cryptography. In: Advances in Cryptology - CRYPTO ’05, LNCS, vol. 218, pp. 417–428, Springer (1986)

    Google Scholar 

  23. Singh, A., Rishi, R.: An improved two-factor authenticated key exchange protocol in public wireless LANs. In: Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 226–230 (2013)

    Google Scholar 

  24. Wang, S.L., Hou, Y.B., Gao, F., Ji, X.R.: A novel IoT access architecture for vehicle monitoring system. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 639–642 (2016)

    Google Scholar 

  25. Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over Internet. IEEE Trans. Inf. Forensics Secur. 9(1), 125–140 (2014)

    Article  Google Scholar 

  26. Zhong, Y.T., Ma, J.F.: A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Netw. 12(6), 592–599 (2010)

    Article  Google Scholar 

  27. IoT Security Solutions, White Paper. https://www.insidesecure.com/Media/Files/Whitepapers/IoT-Security-Solutions

Download references

Acknowledgements

This work was supported by Ministry of Science and Technology of Taiwan Grants MOST 108-2221-E-415-010 and Taiwan Information Security Center at National Sun Yat-sen University (TWISC@NSYSU).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Hung Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, CM., Wang, CH. (2020). Secure Authentication Key Agreement Protocol with eCK Model in Heterogeneous IoT Environment. In: Jain, L., Peng, SL., Wang, SJ. (eds) Security with Intelligent Computing and Big-Data Services 2019. SICBS 2019. Advances in Intelligent Systems and Computing, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-030-46828-6_10

Download citation

Publish with us

Policies and ethics