Skip to main content

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1095))

Abstract

With the exponential growth of interconnected devices, Internet of Things has played an indispensable part of our modern life. However, the constraint of the devices greatly limits the development of IoT and has become one of the major bottlenecks for the large-scale deployment of the devices. Cloud computing, as a technique for the analysis and storage of a large amount of heterogeneity data, is a key solution to this. However, the integrating of IoT and cloud computing also brings new security and privacy challenge. Therefore, an authentication mechanism must be provided to verify user’s identity and ensure the data be accessed without authorization. However, we found most of the authentication schemes for IoT do not truly integrate the cloud computing thus are not suitable for IoT. To improve this unsatisfactory condition, we depicted the architecture of the cloud-assisted IoT environment, and for the first time designed a new secure and privacy preserving user authentication scheme for cloud-assisted IoT environment. Furthermore, we compared the proposed scheme with several related schemes from security functions and performance, the result showed the superiority of our scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alhakbani, N., Hassan, M.M., Hossain, M.A., Alnuem, M.: A framework of adaptive interaction support in cloud-based internet of things (IoT) environment. In: Proceedings of the IDCS (Internet and Distributed Computing System), pp. 136–146 (2014)

    Google Scholar 

  2. Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Gener. Comput. Sys. 78, 1005–1019 (2018)

    Article  Google Scholar 

  3. Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Sys. 56, 684–700 (2016)

    Article  Google Scholar 

  4. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  5. Dhillon, P.K., Kalra, S.: Secure multifactor remote user authentication scheme for Internet of Things environments. Int. J. Commun Syst 30(16), e3323 (2017)

    Article  Google Scholar 

  6. Fan, R., He, D., Pan, X., Ping, L.: An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejinag Univ. Sci. C 12(7), 550–560 (2011)

    Article  Google Scholar 

  7. Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 36, 152–176 (2016)

    Article  Google Scholar 

  8. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Sys. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  9. Hossain, M.S., Muhammad, G.: Cloud-assisted Industrial Internet of Things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101, 192–202 (2016)

    Article  Google Scholar 

  10. Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)

    Article  Google Scholar 

  11. Khan, M., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450–2459 (2010)

    Article  Google Scholar 

  12. Kumar, P., Gurtov, A., Ylianttila, M., Lee, S., Lee, H.: A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35(5), 889–899 (2013)

    Article  Google Scholar 

  13. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)

    Article  Google Scholar 

  14. Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inform. 14(8), 3599–3609 (2018)

    Article  Google Scholar 

  15. Mal, C., Wang, D., Zhao, S.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun Syst 27(10), 2215–2227 (2012)

    Google Scholar 

  16. Mell, P., Grance, T., et al.: The nist definition of cloud computing. NatI. Inst. Stand. Technol 53(6), 50 (2009)

    Google Scholar 

  17. Reddy, A.G., Das, A.K., Yoon, E.J., Yoo, K.Y.: A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4, 4394–4407 (2016)

    Article  Google Scholar 

  18. Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018)

    Article  Google Scholar 

  19. Srinivas, J., Das, A.K., Wazid, M., Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things (2018). https://doi.org/10.1109/TDSC.2018.2857811

  20. Sun, D., Li, J., Feng, Z., Cao, Z., Xu, G.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17(5), 895–905 (2013)

    Article  Google Scholar 

  21. Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)

    Article  Google Scholar 

  22. Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73(C), 41–57 (2014)

    Article  Google Scholar 

  23. Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Depend. Secur. Comput. 15(4), 708–722 (2018)

    Google Scholar 

  24. Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 14(9), 4081–4092 (2018)

    Article  Google Scholar 

  25. Wazid, M., Das, A.K., Khan, M.K., Al-Ghaiheb, A.D., Kumar, N., Vasilakos, A.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things J. 5(1), 269–282 (2018)

    Article  Google Scholar 

  26. Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment (2017). https://doi.org/10.1109/TDSC.2017.2764083

  27. Wu, F., et al.: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89, 72–85 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Key Research and Development Plan of China under Grant No. 2018YFB0803605, and by the National Natural Science Foundation of China under Grant No. 61802006, and by China Postdoctoral Science Foundation under Grants No. 2018M640026 and No. 2019T120019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guoai Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, C., Wang, D., Wang, H., Xu, G., Sun, J., Wang, H. (2019). Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. In: Meng, W., Furnell, S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. https://doi.org/10.1007/978-981-15-0758-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0758-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0757-1

  • Online ISBN: 978-981-15-0758-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics