A Lightweight Key Management Protocol for IoT-based Cloud Environment

Authors

  • Zahra Dehghani Firoozabadi Department of Computer Engineering, Pooyesh University, Qom, Iran
  • Ali Shahidinejad Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran

Abstract

Internet of Things (IoT) allows billions of objects to be connected to collect and exchange data for offering various applications. IoT devices are confronted with various security and privacy risks, which raise serious concerns towards users and also, they generally have some limitations in energy consumption. In this paper, we propose a hierarchical identity-based authentication key agreement protocol, providing a lightweight key management approach for cloud computing users. Then, we analyse the security properties of the proposed protocol using Scyther tool.

 

REFERENCES

[1]         R. Martínez-Peláez et al., "An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances," Sensors, vol. 19, no. 9, p. 2098, 2019.

[2]         A. Shahidinejad and M. Ghobaei‐Arani, "Joint computation offloading and resource provisioning for edge‐cloud computing environment: A machine learning‐based approach," Software: Practice and Experience, vol. 50, no. 12, pp. 2212-2230, 2020.

[3]         A. Shahidinejad, M. Ghobaei-Arani, and M. Masdari, "Resource provisioning using workload clustering in cloud computing environment: a hybrid approach," Cluster Computing, pp. 1-24, 2020.

[4]         S. Farahani and A. Shahidinejad, "A Lightweight Secure Scheme for Internet of Things," International Journal Series in Engineering Science (IJSES)(ISSN: 2455-3328), vol. 6, pp. 15-21, 2020.

[5]         C. J. Cremers, "The Scyther Tool: Verification, falsification, and analysis of security protocols," in International conference on computer aided verification, 2008, pp. 414-418: Springer.

[6]         L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.

[7]         H. Song, G. Fink, and S. Jeschke, Security and Privacy in Cyber-Physical Systems. Wiley Online Library, 2017.

[8]         L.-H. Li, L.-C. Lin, and M.-S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001.

[9]         S. Kalra and S. K. Sood, "Secure authentication scheme for IoT and cloud servers," Pervasive and Mobile Computing, vol. 24, pp. 210-223, 2015.

[10]       R. Amin, N. Kumar, G. Biswas, R. Iqbal, and V. Chang, "A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment," Future Generation Computer Systems, vol. 78, pp. 1005-1019, 2018.

[11]       K. Xue, P. Hong, and C. Ma, "A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture," Journal of Computer and System Sciences, vol. 80, no. 1, pp. 195-206, 2014.

[12]       V. Kumar, M. Ahmad, D. Mishra, S. Kumari, and M. K. Khan, "RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing," Vehicular Communications, vol. 22, p. 100213, 2020.

[13]       A. Shahidinejad, E. Nikoogoftar, and R. Ahsan, "Software as a Service Placement in the Cloud Computing Using Genetic Algorithm," International Journal Series in Engineering Science (IJSES)(ISSN: 2455-3328), vol. 6, pp. 22-33, 2020.

[14]       I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, "Cloud-centric multi-level authentication as a service for secure public safety device networks," IEEE Communications Magazine, vol. 54, no. 4, pp. 47-53, 2016.

[15]       J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu, and L. Liu, "Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks," IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7940-7954, 2020.

[16]       A. Shahidinejad, M. Ghobaei-Arani, and L. Esmaeili, "An elastic controller using Colored Petri Nets in cloud computing environment," Cluster Computing, pp. 1-27, 2019.

[17]       A. Shahidinejad, M. Ghobaei-Arani, A. Souri, M. Shojafar, and S. Kumari, "Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment," IEEE Consumer Electronics Magazine, 2021.

[18]       A. Shahidinejad, M. Ghobaei-Arani, A. Souri, M. Shojafar, and S. Kumari, "A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment," arXiv preprint arXiv:2101.06676, 2021.

[19]       J. B. Fraleigh, A first course in abstract algebra. Pearson Education India, 2003.

[20]       H. A. Elbaz, M. H. Abd-elaziz, and M. T. Nazmy, "Analysis and verification of a key agreement protocol over cloud computing using scyther tool," International Journal of Distributed and Cloud Computing, vol. 2, no. 2, pp. 1-7, 2014.

Downloads

Published

2021-01-31

How to Cite

Dehghani Firoozabadi, Z., & Shahidinejad, A. (2021). A Lightweight Key Management Protocol for IoT-based Cloud Environment. International Journal Series in Engineering Science, 1(1), 90-104. Retrieved from http://ijseries.com/index.php/IJSES/article/view/14