• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

可持续智慧城市中物联网设备的轻量级认证(LAID)

Lightweight authentication for IoT devices (LAID) in sustainable smart cities.

作者信息

Khalique Aqeel, Siddiqui Farheen, Ahad Mohd Abdul, Hussain Imran

机构信息

Department of Computer Science and Engineering, SEST, Jamia Hamdard, New Delhi, India.

出版信息

Sci Rep. 2025 Jul 14;15(1):25410. doi: 10.1038/s41598-025-10181-0.

DOI:10.1038/s41598-025-10181-0
PMID:40659729
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12260107/
Abstract

As smart cities evolve to meet sustainability goals; the proliferation of Internet of Things (IoT) devices presents both opportunities and challenges. Due to constrained nature of IoT, ensuring security in IoT enabled network is a challenge. However, growing urban population and exponential rise in IoT enabled devices make it challenging to implement and ensure security mechanisms. Several attacks such as device compromise, hijacking, tampering, man in the middle attack, replay attack, insider attack may lead to security breach. The reason behind these kinds of attacks is that an adversary has successfully obtained credentials for authentication. Several algorithms in smart cities domain have been proposed but most of them are computationally intensive schemes and some algorithms do not have password update feature. In this paper, we propose a 4-phase lightweight authentication algorithm for IoT devices in sustainable smart cities (SSC) utilizing elliptic curve cryptography (ECC) with password update phase and improved computational and communication cost. We perform a formal security analysis of the proposed algorithm using AVISPA tool and informal semantic analysis to demonstrate that our algorithm is secure against different types of attacks including MITM attack, insider attack, replay attack smart device capture attack and others. The proposed algorithm shows remarkable improvement having 1.248 ms computational time and 1036 bits communication cost. The performance analysis shows that the proposed algorithm is lightweight and shows 22.19%, 28.05% and 22.19% improvement in computation, communication and energy costs respectively as compared to the closest counterpart in existing state-of-the-art approaches.

摘要

随着智慧城市不断发展以实现可持续发展目标,物联网(IoT)设备的激增带来了机遇和挑战。由于物联网的受限特性,确保物联网网络中的安全性是一项挑战。然而,不断增长的城市人口以及物联网设备的指数级增长使得实施和确保安全机制变得具有挑战性。诸如设备被攻破、劫持、篡改、中间人攻击、重放攻击、内部人员攻击等多种攻击可能导致安全漏洞。这些攻击背后的原因是对手成功获取了用于认证的凭证。智慧城市领域已经提出了几种算法,但其中大多数是计算密集型方案,并且一些算法没有密码更新功能。在本文中,我们提出了一种用于可持续智慧城市(SSC)中物联网设备的4阶段轻量级认证算法,该算法利用椭圆曲线密码学(ECC),具有密码更新阶段,并降低了计算和通信成本。我们使用AVISPA工具对所提出的算法进行了形式化安全分析,并进行了非形式化语义分析,以证明我们的算法对包括中间人攻击、内部人员攻击、重放攻击、智能设备捕获攻击等不同类型的攻击具有安全性。所提出的算法表现出显著的改进,计算时间为1.248毫秒,通信成本为1036位。性能分析表明,与现有最先进方法中最接近的对应算法相比,所提出的算法是轻量级的,在计算、通信和能源成本方面分别提高了22.19%、28.05%和22.19%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/12a4191d9067/41598_2025_10181_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/e2ce04f56da0/41598_2025_10181_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/124368d2d074/41598_2025_10181_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/f73800455f6c/41598_2025_10181_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/2bffa7c1c975/41598_2025_10181_Fig4a_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/0680f4e2057f/41598_2025_10181_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/36311a7b31a5/41598_2025_10181_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/112e0ef6d806/41598_2025_10181_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/12a4191d9067/41598_2025_10181_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/e2ce04f56da0/41598_2025_10181_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/124368d2d074/41598_2025_10181_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/f73800455f6c/41598_2025_10181_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/2bffa7c1c975/41598_2025_10181_Fig4a_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/0680f4e2057f/41598_2025_10181_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/36311a7b31a5/41598_2025_10181_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/112e0ef6d806/41598_2025_10181_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87b9/12260107/12a4191d9067/41598_2025_10181_Fig8_HTML.jpg

相似文献

1
Lightweight authentication for IoT devices (LAID) in sustainable smart cities.可持续智慧城市中物联网设备的轻量级认证(LAID)
Sci Rep. 2025 Jul 14;15(1):25410. doi: 10.1038/s41598-025-10181-0.
2
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
3
Short-Term Memory Impairment短期记忆障碍
4
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
5
IAESR: IoT-oriented authenticated encryption based on iShadow round function.IAESR:基于iShadow轮函数的面向物联网的认证加密
PeerJ Comput Sci. 2025 Jun 11;11:e2947. doi: 10.7717/peerj-cs.2947. eCollection 2025.
6
The Black Book of Psychotropic Dosing and Monitoring.《精神药物剂量与监测黑皮书》
Psychopharmacol Bull. 2024 Jul 8;54(3):8-59.
7
Cross-Layer Analysis of Machine Learning Models for Secure and Energy-Efficient IoT Networks.用于安全且节能的物联网网络的机器学习模型的跨层分析
Sensors (Basel). 2025 Jun 13;25(12):3720. doi: 10.3390/s25123720.
8
Improved model for intrusion detection in the Internet of Things.物联网中入侵检测的改进模型。
Sci Rep. 2025 Jul 1;15(1):21547. doi: 10.1038/s41598-025-92852-6.
9
A lightweight and secure authentication and privacy protection scheme for internet of medical things.一种用于医疗物联网的轻量级安全认证与隐私保护方案。
Sci Rep. 2025 Jul 4;15(1):23876. doi: 10.1038/s41598-025-05910-4.
10
Systemic pharmacological treatments for chronic plaque psoriasis: a network meta-analysis.慢性斑块状银屑病的全身药理学治疗:一项网状Meta分析。
Cochrane Database Syst Rev. 2020 Jan 9;1(1):CD011535. doi: 10.1002/14651858.CD011535.pub3.

本文引用的文献

1
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.一种适用于物联网支持的无线传感器网络的基于高效椭圆曲线密码体制(ECC)和模糊验证器的用户认证协议。
Sci Rep. 2025 Mar 22;15(1):9974. doi: 10.1038/s41598-025-94550-9.
2
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT.基于椭圆曲线密码体制的物联网可证明安全匿名认证与密钥协商方案的安全性评估
Sensors (Basel). 2025 Jan 3;25(1):237. doi: 10.3390/s25010237.
3
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme.
基于生物特征识别和模糊承诺方案的智慧城市节能数据隐私保护协议
Sci Rep. 2024 Jul 13;14(1):16223. doi: 10.1038/s41598-024-67064-z.
4
ECC-based three-factor authentication and key agreement scheme for wireless sensor networks.用于无线传感器网络的基于椭圆曲线密码体制的三因素认证与密钥协商方案
Sci Rep. 2024 Jan 20;14(1):1787. doi: 10.1038/s41598-024-52134-z.
5
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme.利用异构认证方案实现无线体域网中的安全通信。
Sensors (Basel). 2023 Jan 18;23(3):1121. doi: 10.3390/s23031121.
6
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.面向物联网的无线传感器网络增强型用户认证和密钥协商方案。
Sensors (Basel). 2022 Nov 14;22(22):8793. doi: 10.3390/s22228793.
7
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.基于椭圆曲线密码学的工业物联网实用三因素认证协议
Sensors (Basel). 2022 Oct 3;22(19):7510. doi: 10.3390/s22197510.
8
Challenges in Resource-Constrained IoT Devices: Energy and Communication as Critical Success Factors for Future IoT Deployment.资源受限的物联网设备面临的挑战:能源与通信是未来物联网部署的关键成功因素。
Sensors (Basel). 2020 Nov 10;20(22):6420. doi: 10.3390/s20226420.
9
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes.基于中国剩余定理和 ECDH 的智能家居轻量级密钥协商协议。
Sensors (Basel). 2020 Mar 2;20(5):1357. doi: 10.3390/s20051357.
10
A Survey of Internet of Things (IoT) Authentication Schemes.物联网(IoT)认证方案综述。
Sensors (Basel). 2019 Mar 6;19(5):1141. doi: 10.3390/s19051141.