Symmetric and Asymmetric Encryption Schemes for Internet of Things: A Survey
Keywords:
Internet of Things, Authentication, PKC, ECCAbstract
IoT applications such as smart homes can monitor and control users' household chores anytime and anywhere. Similarly, Body Area Networks (BANs) can monitor the physical condition of a patient via various wearable sensors. Several authentication protocols have been proposed for embedded devices based on hash chains, symmetric cryptography, or PKC (public-key cryptography). Nevertheless, approaches based on hash chains and symmetric cryptography require storing large amounts of data regarding user identities and equivalent symmetric ECC keys with an increase in the number of devices. More seriously, updating a user's key and establishing a session key in such a protocol is a complex task. The various key authentication protocol for internet of things are reviewed in this paper. The major techniques which are already been proposed are focused on the complexity of the authentication model.
Downloads
References
N. Druml et al., "A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems," 2014 17th Euromicro Conference on Digital System Design, 2014, pp. 372-378
S. Garg, K. Kaur, G. Kaddoum, S. H. Ahmed, F. Gagnon and M. Guizani, "ECC-based Secure and Lightweight Authentication Protocol for Mobile Environment," IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2019, pp. 1-6
S. Khan and R. K. Aggarwal, "Efficient Mutual Authentication mechanism to Secure Internet of Things (IoT)," 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 2019, pp. 409-412
S. Shamshad, K. Mahmood, S. Kumari and M. K. Khan, "Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”," in IEEE Systems Journal, vol. 15, no. 1, pp. 877-880, March 2021
U. Satapathy, B. K. Mohanta, D. Jena and S. Sobhanayak, "An ECC based Lightweight Authentication Protocol For Mobile Phone in Smart Home," 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS), 2018, pp. 303-308
E. Lara, L. Aguilar and J. A. García, "Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications," in IEEE Access, vol. 9, pp. 79196-79213, 2021
B. AMOR, M. ABID and A. MEDDEB, "SAMAFog: Service-Aware Mutual Authentication Fog-based Protocol," 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019, pp. 1049-1054
G. Shen and B. Liu, "Research on Embedding ECC into RFID Authentication Protocol," 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 1835-1838
M. K. Gupta, R. Kumar and S. Kumari, "Flaws and Amendment in an ECC-based Authentication Scheme for SIP," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 372-376
S. Garg, K. Kaur, G. Kaddoum and M. Client, "ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020, pp. 1-6
H. Debiao, C. Jianhua, and H. Jin, “An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security,” Information Fusion, vol. 13, no. 3, pp. 223–230, 2012.
R. A. Goutham, G.-J. Lee, and K.-Y. Yoo, “An anonymous id-based remote mutual authentication with key agreement protocol on ecc using smart cards,” in Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, 2015, pp. 169–174.
Aakanksha Tewari, B. B. Gupta, “A robust anonymity preserving authentication protocol for IoT devices”, 2018, IEEE International Conference on Consumer Electronics (ICCE)
Manasha Saqib, Bhat Jasra, Ayaz Hassan Moon, “A lightweight three factor authentication framework for IoT based critical applications”, 2021, Journal of King Saud University - Computer and Information Sciences
Vidya Rao, Prema K. V., “Lightweight Authentication and Data Encryption Scheme for IoT Applications”, 2020, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)
UtkalikaSatapathy, Bhabendu Kumar Mohanta, Debsish Jena, SrichandanSobhanayak, “An ECC based Lightweight Authentication ProtocolFor Mobile Phone in Smart Home”, 2018, IEEE 13th International Conference on Industrial and Information Systems (ICIIS)
Sahil Garg, Kuljeet Kaur, Georges Kaddoum, Kim-Kwang Raymond Choo, “Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0”, 2020, IEEE Internet of Things Journal
Sarmadullah Khan, Ahmed Ibrahim Alzahrani, Osama Alfarraj, Nasser Alalwan, Ali H. Al-Bayatti, “Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices”, 2019, IEEE Access
Xuyang Ding, Xiaoxiang Wang, Ying Xie, Fagen Li, “A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things”, 2021, IEEE Internet of Things Journal
Chau D. M. Pham, Tran Khanh Dang, “A lightweight authentication protocol for D2D-enabled IoT systems with privacy”, 2021, Pervasive and Mobile Computing
Syed Wajid Ali Shah, Naeem Firdous Syed, ArashShaghaghi, Adnan Anwar, Zubair Baig, Robin Doss, “Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication”, 2020, IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Bahaa Hussein Taher, Sheng Jiang, Ali A. Yassin, Hongwei Lu, “Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction”, 2019, IEEE Access
Fadi Farha, Huansheng Ning, Karim Ali, Liming Chen, Christopher Nugent, “SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices”, 2021, IEEE Internet of Things Journal
Tarek A. Idriss, Haytham A. Idriss, Magdy A. Bayoumi, “A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices”, 2021, IEEE Access
Karim Lounis, Mohammad Zulkernine, “T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT”, 2019, IEEE Access
HüsnüYıldız, Murat Cenk, ErtanOnur, “PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol”, 2021, IEEE Internet of Things Journal
Konstantinos Goutsos, Alex Bystrov, “Lightweight PUF-based Continuous Authentication Protocol”, 2019, International Conference on Computing, Electronics & Communications Engineering (iCCECE)
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.