An Efficient Privacy-Preserving ID Centric Authentication in IoT Based Cloud Servers for Sustainable Smart Cities
- PDF / 2,883,147 Bytes
- 25 Pages / 439.37 x 666.142 pts Page_size
- 71 Downloads / 259 Views
An Efficient Privacy‑Preserving ID Centric Authentication in IoT Based Cloud Servers for Sustainable Smart Cities Ajay Kumar1 · Kumar Abhishek1 · Xuan Liu2 · Anandakumar Haldorai3 Accepted: 11 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Smart cities or Smart societies require Internet of Things (IoT), for connecting numerous devices to enormous asset pools in cloud computing. This coordination of embedded tools plus cloud servers conveys the extensive applicability of IoT in Smart Cities. However, authentication and data protection, play a major job in secure coordination of these two technologies. Considering this, in 2017, Chang et al.s system introduced famous verification system dependent on an elliptic curve cryptography (ECC) for IoT plus cloud servers for Smart Cities and guaranteed that it fulfills need of security protocols and is safe to different sorts of assaults. Nevertheless, in this paper, we demonstrate that Chang et.al. system is defenseless to a privileged insider intrusion, server impersonation intrusion, known session-specific information intrusion and offline password guessing intrusion. In addition, it does not accomplish device anonymity and mutual authentication. Considering this weakness of existing system, we propose an authentication system dependent on ECC for IoT and cloud servers in Smart Cities. The suggested system accomplishes mutual authentication and supports fundamental safety necessities. The informal security examination, performance analysis and contrast of the suggested system with existing systems prove that the suggested method is powerful, effective and stout as a counter to manifold security threats faced by Smart Cities. The formal confirmation of the suggested procedure is performed by AVISPA tools, which affirms its safety strength within the sight of a conceivable invader. Keywords Smart cities · Smart homes · Authentication · Elliptic curve cryptography (ECC) · Security intrusion in smart homes · Security analysis · Wireless management * Ajay Kumar [email protected] Kumar Abhishek [email protected] Xuan Liu [email protected] Anandakumar Haldorai [email protected] 1
Department of Computer Science and Engineering, NIT, Patna, Bihar, India
2
School of Information Engineering, Yangzhou University, Yangzhou, China
3
Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, TamilNadu, India
13
Vol.:(0123456789)
A. Kumar et al.
1 Introduction For Internet of Things protocols that enable Smart Cities, Elliptic-curve cryptography (ECC) based authentication is one of the productive public key cryptographies, as it offers a comparable security level with a conservative key size [1–4]. It is highly reliable and gives a valuable trade-off between security and effectiveness compared to other authentications. It can build up improved key agreement and provide security with lower computational complexity. Therefore, it is often used for the cloud computi
Data Loading...