No Cover Image

Journal article 51 views 10 downloads

Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments / Gurjot Singh Gaba; Gulshan Kumar; Himanshu Monga; Tai-Hoon Kim; Pardeep Kumar

IEEE Access, Volume: 8, Pages: 69722 - 69733

Swansea University Author: Pardeep, Kumar

  • 54214.pdf

    PDF | Version of Record

    Released under the terms of a Creative Commons Attribution 4.0 License (CC-BY).

    Download (1.79MB)

Abstract

In the smart environments several smart devices are continuously working together to make individuals' lives more comfortable. Few of the examples are smart homes, smart buildings, smart airports, etc. These environments consist of many resource constrained heterogeneous entities which are inte...

Full description

Published in: IEEE Access
ISSN: 2169-3536
Published: Institute of Electrical and Electronics Engineers (IEEE) 2020
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa54214
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: In the smart environments several smart devices are continuously working together to make individuals' lives more comfortable. Few of the examples are smart homes, smart buildings, smart airports, etc. These environments consist of many resource constrained heterogeneous entities which are interconnected, controlled, monitored and analyzed through the Internet. One of the most challenging tasks in a distributed smart environment is how to provide robust security to the resource constraint Internet-enabled devices. However, an authentication can play a major role ensuring that only authorized devices are being connected to the distributed smart environment applications. In this paper, we present a robust and lightweight mutual-authentication scheme (RLMA) for protecting distributed smart environments from unauthorized abuses. The proposed scheme uses implicit certificates and enables mutual authentication and key agreement between the smart devices in a smart environment. The RLMA not only resists to various attacks but it also achieves efficiency by reducing the computation and communication complexities. Moreover, both security analysis and performance evaluation prove the effectiveness of RLMA as compared to the state of the art schemes.
Keywords: authentication, elliptic curve Qu-Vanstone (ECQV), Internet of Things (IoT), implicitcertificate, security
Start Page: 69722
End Page: 69733