Abstract
Internet of Things (IoT) has been developed increasingly and is a next wave in the era of computing. IoT is the concept in which many of the objects are getting networked and connected anytime and anyplace. It uses any network and any service in a heterogeneous circumstance. According to recent research, it is estimated nearly 30 billion devices on IoT; therefore, the security issues on IoT turn into a vital fundamental in present tendency. Although IoT brought convenience life, most existing IoT devices were controlled by multiple units (or parties), including owners, employees, and maintenance vendors. Distinct units may join different Certificate Authorities (CAs) for the public key management. How to share a common session key between IoT devices certified by distinct CAs is a practical issue worth to be studied. Therefore, we propose an authentication key agreement protocol using elliptic curve algorithm with extended Canetti-Krawczyk (eCK) security that can solve heterogeneous IoT session key problem for distinct CAs and satisfies all security requirements of AKA protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology CRYPTO 1993, pp. 110–125. Springer (1993)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
Chen, L., Lim, H.W., Yang, G.: Cross-domain password-based authenticated key exchange revisited. In: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), pp. 1052–1060 (2013)
Chen, L., Kudla, C.: Identity-based authenticated key agreement protocols from pairings. In: Proceeding of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233. IEEE Computer Society Press (2003)
Cheng, Q.F., Han, G.G., Ma, C.G.: A new efficient and strongly secure authenticated key exchange protocol. In: Fifth International Conference on Information Assurance and Security, pp. 499–502 (2009)
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. LNCS, vol. 2045, pp. 453–474. Springer (2001)
Da, B., Esnault, P.P., Hu, S.H., Wang, C.: Identity/identifier-enabled networks (IDEAS) for Internet of Things (IoT). In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 412–415 (2018)
Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Farash, M.S., Attari, M.A.: An ID-based key agreement protocol based on ECC among users of separate networks. In: 9th International ISC Conference on Information Security and Cryptology, pp. 32–37 (2012)
Farash, M.S., Attari, M.A.: Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int. J. Inf. Secur. 5(1), 1–16 (2013)
Farash, M.S., Attari, M.A.: A pairing-free ID-based key agreement protocol with different PKGs. Int. J. Netw. Secur. 16(3), 168–173 (2014)
Hu, X.X., Cheng, Q.F., Liu, W.F., Zhang, Q.H.: A new AKE protocol with stronger security in the eCK model. In: WASE International Conference on Information Engineering, vol. 4, pp. 10–13 (2010)
Krawczyk, H.: A high-performance secure Diffie-Hellman protocol. In: Advances in Cryptology - CRYPTO 2005, LNCS, vol. 3621, pp. 546–566. Springer (2005)
Koblitz, N.: Elliptic curve cryptosystem. Math. Comput. 48(177), 203–209 (1987)
Kushwaha, P.: Towards the equivalence of Diffie-Hellman problem and discrete logarithm problem for important elliptic curves used in practice. ISEA Asia Security and Privacy (ISEASP), pp. 1–4 (2017)
Kumari, P.L.S., Damodaram, A.: An alternative methodology for authentication and confidentiality based on zero knowledge protocols using Diffie-Hellman key exchange. In: 2014 International Conference on Information Technology (ICIT), pp. 368–373 (2014)
Kim, S., Lee, H., Oh, H.: Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In: Proceedings of ICICS, pp. 323–335. Springer (2005)
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)
Lee, H., Kim, D., Kim, S., Oh, H.: Identity-based key agreement protocols in a multiple PKG environment. In: Proceedings of the International Conference on Computer Science and its Applications, ICCSA. LNCS, vol. 3483, pp. 877–886. Springer (2005)
Miladinovic, I., Schefer-Wenzl, S.: NFV enabled IoT architecture for an operating room environment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 98–102 (2018)
Mehibel, N., Hamadouche, M.: A new approach of elliptic curve Diffie-Hellman key exchange. In: 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B), pp. 1–6 (2017)
Miller, V.S.: Uses of elliptic curve in cryptography. In: Advances in Cryptology - CRYPTO ’05, LNCS, vol. 218, pp. 417–428, Springer (1986)
Singh, A., Rishi, R.: An improved two-factor authenticated key exchange protocol in public wireless LANs. In: Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 226–230 (2013)
Wang, S.L., Hou, Y.B., Gao, F., Ji, X.R.: A novel IoT access architecture for vehicle monitoring system. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 639–642 (2016)
Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over Internet. IEEE Trans. Inf. Forensics Secur. 9(1), 125–140 (2014)
Zhong, Y.T., Ma, J.F.: A highly secure identity-based authenticated key-exchange protocol for satellite communication. J. Commun. Netw. 12(6), 592–599 (2010)
IoT Security Solutions, White Paper. https://www.insidesecure.com/Media/Files/Whitepapers/IoT-Security-Solutions
Acknowledgements
This work was supported by Ministry of Science and Technology of Taiwan Grants MOST 108-2221-E-415-010 and Taiwan Information Security Center at National Sun Yat-sen University (TWISC@NSYSU).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, CM., Wang, CH. (2020). Secure Authentication Key Agreement Protocol with eCK Model in Heterogeneous IoT Environment. In: Jain, L., Peng, SL., Wang, SJ. (eds) Security with Intelligent Computing and Big-Data Services 2019. SICBS 2019. Advances in Intelligent Systems and Computing, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-030-46828-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-46828-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-46827-9
Online ISBN: 978-3-030-46828-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)