scispace - formally typeset
Book ChapterDOI

A Robust Lightweight ECC-Based Three-Way Authentication Scheme for IoT in Cloud

Reads0
Chats0
TLDR
A lightweight three-way authentication scheme for IoT in cloud where mutual authentication between IoT node and user’s smart device is performed by remote IoT gateway in cloud to prevent device theft attack and ECC-based communication protocols to ensure less computation and communication overhead.
Abstract
Internet of things is an evolving technology which connects multiple embedded devices with a remote server over Internet. Due to limited capacity of embedded devices, it is important to delegate resources from third-party platform. Lots of research is going on to connect IoT devices to a wide resource pool such as cloud. This integration of IoT with cloud services has enormous possibility for future as resource-intensive processes can be delegated to cloud platform instead of executing in IoT node. This paper proposes a lightweight three-way authentication scheme for IoT in cloud where mutual authentication between IoT node and user’s smart device is performed by remote IoT gateway in cloud. The proposed scheme uses a three-factor user authentication to prevent device theft attack and ECC-based communication protocols to ensure less computation and communication overhead. Moreover, the proposed scheme is analysed to show that it is secure against existing relevant cryptographic attacks.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things Security: Challenges and Key Issues

TL;DR: In this paper, the authors identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service and propose a solution to overcome them.
Journal ArticleDOI

A secure mutual authentication protocol for IoT environment

TL;DR: A secure mutual authentication protocol for IoT and cloud servers based on elliptic curve cryptography is proposed and the supremacy of the proposed protocol over the other related protocols is found.
Journal ArticleDOI

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

TL;DR: This study’s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext attack (CCA).
Journal ArticleDOI

iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography.

TL;DR: This study provides comprehensive details about the mapping techniques used in the ECC mapping phase, and presents performance results about widely used elliptic curves, and suggests an optimal enhanced mapping method and size of padding bit to secure communications that guarantee the successful mapping of points to EC and reduction of padding bits.
Book ChapterDOI

Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System

TL;DR: A privacy-preserving elliptic curve cryptosystem (ECC)-based three-factor authentication scheme based on the SRVC’s features, which can authenticate the identities of users and vehicle, and generate a session secret key to protect the users’ privacy.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

Integration of Cloud computing and Internet of Things

TL;DR: This paper provides an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges, and identifies open issues and future directions in this field, which it expects to play a leading role in the landscape of the Future Internet.
Related Papers (5)