Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication

  • Conference paper
  • First Online:
ITNG 2024: 21st International Conference on Information Technology-New Generations (ITNG 2024)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1456))

Included in the following conference series:

  • 15 Accesses

Abstract

Fog nodes are established to be intermediate between the IoT devices node and the cloud data center to alleviate the latency of data transmission. Fog computing enables low-cost IoT systems to communicate with high-end cloud servers at the network’s edge. As a result, fog systems can conduct data summarization and analysis, resulting in a substantial reduction in request delay for latency-sensitive applications. It can perform data aggregation, reducing the bandwidth required, which is critical for wireless connection with cloud servers. Due to the huge amount of data exchanged among three nodes namely: IoT device, fog, and cloud nodes, it poses many security issues like how to protect these connected devices from unauthorized access.

The challenge is to design a secure mutual authentication protocol that has lightweight to resource-constrained devices. Therefore, IoT-enabled devices demand a lightweight secure cryptography scheme. It’s necessary to secure end-to-end communication in IoT applications to avoid information leakage. This study proposes a lightweight authenticated key agreement protocol based on a hyperelliptic curve which uses a small size base field compared with traditional cryptography methods. The proposed protocol saves communication bandwidth and reduces computational complexity. In addition, the proposed protocol can establish a common session key between three communication nodes. We analysed and proved the security properties of the proposed protocol informally against the known attacks. We found that the proposed protocol can resist known attacks. The comparative analysis of our proposed protocol with related works in contexts of IoT security and performance showed that our work outperformed the protocols of related works by 54% as an average rational improvement with less communication and computation overhead costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Wu, T. Wang, Y. Lee, W. Zheng, S. Kumari, S. Kumar, Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 6658041 (2021)

    Google Scholar 

  2. S. Patonico, A. Braeken, K. Steenhaut, Identity-based and Anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model. Wirel. Netw. 29, 1017–1029 (2023)

    Article  Google Scholar 

  3. X. Jia, D. He, N. Kumar, K.R. Choo, Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737–4750 (2018)

    Article  Google Scholar 

  4. J. Ni, K. Zhang, X. Lin, X. Shen, Securing fog computing for Internet of things applications: Challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2018)

    Article  Google Scholar 

  5. J. Mo, Z. Hu, H. Chen, W. Shen, An efficient and provably secure Anonymous user authentication and key agreement for mobile cloud computing. Wirel. Commun. Mob. Comput. 2019, 1–12 (2019)

    Article  Google Scholar 

  6. V.S. Naresh, S. Reddi, N.V. Murthy, Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie–Hellman for wireless sensor networks. Inf. Secur. J. Glob. Perspect. 29(1), 1–13 (2020)

    Article  Google Scholar 

  7. K. Shafique, B.A. Khawaja, F. Sabir, S. Qazi, M. Mustaqim, Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 8, 23022–23040 (2020)

    Article  Google Scholar 

  8. S. Challa, M. Wazid, A.K. Das, N. Kumar, A.G. Reddy, E.J. Yoon, Y.K. Young, Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)

    Article  Google Scholar 

  9. M. Nikooghadam, R. Jahantigh, H. Arshad, A lightweight authentication and key agreement protocol preserving user anonymity. Multimed. Tools Appl. 76(11), 13401–13423 (2016)

    Article  Google Scholar 

  10. A. Botta, W. De Donato, V. Persico, A. Pescape, On the integration of cloud computing and Internet of things, in 2014 International Conference on Future Internet of Things and Cloud, (2014). https://doi.org/10.1109/FiCloud.2014.14

    Chapter  Google Scholar 

  11. M. Toorani, A. Beheshti, Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve, in 2008 International Conference on Computer and Electrical Engineering (2008)

    Google Scholar 

  12. S. Kumari, S.A. Chaudhry, F. Wu, X. Li, M.S. Farash, M.K. Khan, An improved smart card based authentication scheme for session initiation protocol. Peer Peer Netw. Appl. 10(1), 92–105 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamad Al-Samhouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Samhouri, M., Abur-rous, M., Novas, N. (2024). Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication. In: Latifi, S. (eds) ITNG 2024: 21st International Conference on Information Technology-New Generations. ITNG 2024. Advances in Intelligent Systems and Computing, vol 1456. Springer, Cham. https://doi.org/10.1007/978-3-031-56599-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56599-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56598-4

  • Online ISBN: 978-3-031-56599-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation