外文摘要:The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely spread in important life fields like smart farming, by collecting and transferring data from agricultural environment to cloud servers and farming experts. Ensure the security of the data transferred is always an important issue. Hence, many researchers have proposed secure schemes in IoT systems. However, these schemes still present some flaws and they are vulnerable against some known attacks as impersonation, man in the middle, session key disclosure, password guessing and stolen smart card. Besides, they are not all adaptable to lightweight devices. Therefore, the purpose of this present work is to ensure user's privacy and data confidentiality by authenticating all legitimate network members and securing their communications. Accordingly, we propose three schemes of authentication and key management taking into consideration not only the security requirements but also the resource limit of network devices. A formal security verification of the three schemes is performed using Burrows-Abadi-Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther verification tool. The results show that each scheme ensures mutual authentication and session key secrecy. They are secure against some known attacks as man in the middle, replay and impersonation. Besides, the performance analysis comparison show the lightness of the proposed schemes regarding recent related schemes and hence they are adaptable to different IoT devices.
外文关键词:Internet of Things;Security;AUTHENTICATION;Elliptic curve cryptography;Session key;AVISPA;Scyther
作者:Cherbal, Sarra
作者单位:Univ Ferhat Abbas Set 1
期刊名称:WIRELESS PERSONAL COMMUNICATIONS
期刊影响因子:0.0
出版年份:2024
出版刊次:135(2)
原文传递申请:江苏省科技资源(工程技术文献)统筹服务平台