IEEE Access (Jan 2017)

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

  • Sravani Challa,
  • Mohammad Wazid,
  • Ashok Kumar Das,
  • Neeraj Kumar,
  • Alavalapati Goutham Reddy,
  • Eun-Jun Yoon,
  • Kee-Young Yoo

DOI
https://doi.org/10.1109/ACCESS.2017.2676119
Journal volume & issue
Vol. 5
pp. 3028 – 3043

Abstract

Read online

Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi-Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.

Keywords