Abstract
Fog nodes are established to be intermediate between the IoT devices node and the cloud data center to alleviate the latency of data transmission. Fog computing enables low-cost IoT systems to communicate with high-end cloud servers at the network’s edge. As a result, fog systems can conduct data summarization and analysis, resulting in a substantial reduction in request delay for latency-sensitive applications. It can perform data aggregation, reducing the bandwidth required, which is critical for wireless connection with cloud servers. Due to the huge amount of data exchanged among three nodes namely: IoT device, fog, and cloud nodes, it poses many security issues like how to protect these connected devices from unauthorized access.
The challenge is to design a secure mutual authentication protocol that has lightweight to resource-constrained devices. Therefore, IoT-enabled devices demand a lightweight secure cryptography scheme. It’s necessary to secure end-to-end communication in IoT applications to avoid information leakage. This study proposes a lightweight authenticated key agreement protocol based on a hyperelliptic curve which uses a small size base field compared with traditional cryptography methods. The proposed protocol saves communication bandwidth and reduces computational complexity. In addition, the proposed protocol can establish a common session key between three communication nodes. We analysed and proved the security properties of the proposed protocol informally against the known attacks. We found that the proposed protocol can resist known attacks. The comparative analysis of our proposed protocol with related works in contexts of IoT security and performance showed that our work outperformed the protocols of related works by 54% as an average rational improvement with less communication and computation overhead costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. Wu, T. Wang, Y. Lee, W. Zheng, S. Kumari, S. Kumar, Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 6658041 (2021)
S. Patonico, A. Braeken, K. Steenhaut, Identity-based and Anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model. Wirel. Netw. 29, 1017–1029 (2023)
X. Jia, D. He, N. Kumar, K.R. Choo, Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737–4750 (2018)
J. Ni, K. Zhang, X. Lin, X. Shen, Securing fog computing for Internet of things applications: Challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2018)
J. Mo, Z. Hu, H. Chen, W. Shen, An efficient and provably secure Anonymous user authentication and key agreement for mobile cloud computing. Wirel. Commun. Mob. Comput. 2019, 1–12 (2019)
V.S. Naresh, S. Reddi, N.V. Murthy, Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie–Hellman for wireless sensor networks. Inf. Secur. J. Glob. Perspect. 29(1), 1–13 (2020)
K. Shafique, B.A. Khawaja, F. Sabir, S. Qazi, M. Mustaqim, Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 8, 23022–23040 (2020)
S. Challa, M. Wazid, A.K. Das, N. Kumar, A.G. Reddy, E.J. Yoon, Y.K. Young, Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)
M. Nikooghadam, R. Jahantigh, H. Arshad, A lightweight authentication and key agreement protocol preserving user anonymity. Multimed. Tools Appl. 76(11), 13401–13423 (2016)
A. Botta, W. De Donato, V. Persico, A. Pescape, On the integration of cloud computing and Internet of things, in 2014 International Conference on Future Internet of Things and Cloud, (2014). https://doi.org/10.1109/FiCloud.2014.14
M. Toorani, A. Beheshti, Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve, in 2008 International Conference on Computer and Electrical Engineering (2008)
S. Kumari, S.A. Chaudhry, F. Wu, X. Li, M.S. Farash, M.K. Khan, An improved smart card based authentication scheme for session initiation protocol. Peer Peer Netw. Appl. 10(1), 92–105 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Al-Samhouri, M., Abur-rous, M., Novas, N. (2024). Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication. In: Latifi, S. (eds) ITNG 2024: 21st International Conference on Information Technology-New Generations. ITNG 2024. Advances in Intelligent Systems and Computing, vol 1456. Springer, Cham. https://doi.org/10.1007/978-3-031-56599-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-56599-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56598-4
Online ISBN: 978-3-031-56599-1
eBook Packages: EngineeringEngineering (R0)