• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于物联网的基于轻量级椭圆曲线密码体制的具有动态认证凭证的认证与密钥协商协议。

A Lightweight ECC-Based Authentication and Key Agreement Protocol for IoT with Dynamic Authentication Credentials.

作者信息

Li Momo, Hu Shunfang

机构信息

School of Mathematics and Computer Science, Yunnan Minzu University, Kunming 650504, China.

出版信息

Sensors (Basel). 2024 Dec 13;24(24):7967. doi: 10.3390/s24247967.

DOI:10.3390/s24247967
PMID:39771704
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11679686/
Abstract

Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However, designing an AKA protocol for IoT presents significant challenges, as most IoT sensors are deployed in resource-constrained, unattended environments with limited computational power, connectivity, and storage. To achieve anonymous authentication, existing solutions typically rely on shared temporary public keys to mask device IDs or validate sender certificates, which increases the computational overhead. Furthermore, these protocols often fail to address crucial security concerns, such as nonresistance to ephemeral secret leakage (ESL) attacks and a lack of perfect forward security. To mitigate the computational burden, we propose a dynamic authenticated credentials (DACs) synchronization framework for anonymous authentication. Then, we introduce an ECC-based AKA scheme that employs DACs in place of temporary public keys or sender credentials, enabling efficient and secure anonymous authentication. The security of the proposed protocol was rigorously verified under the Real-or-Oracle model and validated using ProVerif. Performance comparisons demonstrate that our scheme offered significant improvements in security, with an over 37% reduction in communication cost and computational overhead.

摘要

由于通信渠道的开放性以及所收集和传输数据的敏感性,在物联网系统中确保数据访问和通信安全需要强大的基于椭圆曲线密码体制(ECC)的认证和密钥协商(AKA)协议。然而,为物联网设计一个AKA协议面临重大挑战,因为大多数物联网传感器部署在资源受限、无人值守的环境中,其计算能力、连接性和存储都有限。为了实现匿名认证,现有解决方案通常依赖共享临时公钥来掩盖设备ID或验证发送方证书,这增加了计算开销。此外,这些协议往往未能解决关键的安全问题,如无法抵御临时密钥泄露(ESL)攻击以及缺乏完美前向安全性。为了减轻计算负担,我们提出了一种用于匿名认证的动态认证凭证(DACs)同步框架。然后,我们引入了一种基于ECC的AKA方案,该方案使用DACs代替临时公钥或发送方凭证,实现高效且安全的匿名认证。所提出协议的安全性在真实或预言机模型下得到了严格验证,并使用ProVerif进行了验证。性能比较表明,我们的方案在安全性方面有显著提升,通信成本和计算开销降低了超过37%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f301/11679686/22312a146cc2/sensors-24-07967-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f301/11679686/b8e68e748d77/sensors-24-07967-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f301/11679686/22312a146cc2/sensors-24-07967-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f301/11679686/b8e68e748d77/sensors-24-07967-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f301/11679686/22312a146cc2/sensors-24-07967-g002.jpg

相似文献

1
A Lightweight ECC-Based Authentication and Key Agreement Protocol for IoT with Dynamic Authentication Credentials.一种用于物联网的基于轻量级椭圆曲线密码体制的具有动态认证凭证的认证与密钥协商协议。
Sensors (Basel). 2024 Dec 13;24(24):7967. doi: 10.3390/s24247967.
2
Efficient IoT User Authentication Protocol with Semi-Trusted Servers.具有半可信服务器的高效物联网用户认证协议
Sensors (Basel). 2025 Mar 23;25(7):2013. doi: 10.3390/s25072013.
3
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns.基于高效椭圆曲线密码学的物联网匿名认证:针对周期性和远程控制流量模式的定制协议
Sensors (Basel). 2025 Feb 2;25(3):897. doi: 10.3390/s25030897.
4
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.5G-AKA-FS:一种用于前向保密的5G认证与密钥协商协议。
Sensors (Basel). 2023 Dec 27;24(1):159. doi: 10.3390/s24010159.
5
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT.基于椭圆曲线密码体制的物联网可证明安全匿名认证与密钥协商方案的安全性评估
Sensors (Basel). 2025 Jan 3;25(1):237. doi: 10.3390/s25010237.
6
Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.面向基于云的物联网环境的可证明安全的轻量级相互认证与密钥协商方案。
Sensors (Basel). 2023 Dec 11;23(24):9766. doi: 10.3390/s23249766.
7
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks.SELWAK:一种用于基于物联网的车联网的安全高效轻量级匿名认证和密钥建立方案。
Sensors (Basel). 2022 May 26;22(11):4019. doi: 10.3390/s22114019.
8
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols.整合OWL密码认证密钥交换协议以增强物联网应用协议。
Sensors (Basel). 2025 Apr 14;25(8):2468. doi: 10.3390/s25082468.
9
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things.基于物联网 CoAP 的轻量级匿名认证和密钥协商协议。
Sensors (Basel). 2022 Sep 22;22(19):7191. doi: 10.3390/s22197191.
10
Dickson polynomial-based secure group authentication scheme for Internet of Things.基于迪克森多项式的物联网安全群组认证方案
Sci Rep. 2024 Feb 28;14(1):4947. doi: 10.1038/s41598-024-55044-2.

本文引用的文献

1
Data Gathering Techniques in WSN: A Cross-Layer View.无线传感器网络中的数据采集技术:一种跨层视角。
Sensors (Basel). 2022 Mar 30;22(7):2650. doi: 10.3390/s22072650.