A lightweight privacy protection user authentication and key agreement scheme tailored for the internet of things environment: LightPriauth

25Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Different data are collected by diverse sensors under an Internet of things scenario, such as health data, environmental data, and traffic flow data. People can access data remotely via the Internet easily. Considering the importance and confidentiality of these data, it is necessary to ensure the data security. In this study, we propose an authentication and key establishment scheme for an Internet of things scenario based on low-capability devices. This scheme achieves many security features: user anonymity, sensor anonymity, forward secrecy, resistance to the loss of synchronization problem, and so on We verified these security features using AVISPA and ProVerif; both results show that the scheme is safe enough to achieve the security requirements. Besides, the experiment results elucidate that this scheme gains an advantage in computation and communication costs. It is because of the sole usage of XOR operations and hash functions as well as a minimal amount of asymmetric encryptions to fulfil forward secrecy.

References Powered by Scopus

The AVISPA tool for the automated validation of internet security protocols and applications

1054Citations
N/AReaders
Get full text

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

794Citations
N/AReaders
Get full text

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

613Citations
N/AReaders
Get full text

Cited by Powered by Scopus

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

97Citations
N/AReaders
Get full text

Faster Authenticated Key Agreement with Perfect Forward Secrecy for Industrial Internet-of-Things

56Citations
N/AReaders
Get full text

On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks

54Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Chen, Y., López, L., Martínez, J. F., & Castillejo, P. (2018). A lightweight privacy protection user authentication and key agreement scheme tailored for the internet of things environment: LightPriauth. Journal of Sensors, 2018. https://doi.org/10.1155/2018/7574238

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 11

85%

Lecturer / Post doc 2

15%

Readers' Discipline

Tooltip

Computer Science 10

77%

Business, Management and Accounting 1

8%

Mathematics 1

8%

Economics, Econometrics and Finance 1

8%

Save time finding and organizing research with Mendeley

Sign up for free