A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor

A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor

Sebbah Abderrezzak, Kadri Benamar
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 22
ISSN: 1947-9301|EISSN: 1947-931X|EISBN13: 9781683181293|DOI: 10.4018/IJTD.313643
Cite Article Cite Article

MLA

Abderrezzak, Sebbah, and Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor." IJTD vol.13, no.1 2022: pp.1-22. http://doi.org/10.4018/IJTD.313643

APA

Abderrezzak, S. & Benamar, K. (2022). A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor. International Journal of Technology Diffusion (IJTD), 13(1), 1-22. http://doi.org/10.4018/IJTD.313643

Chicago

Abderrezzak, Sebbah, and Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor," International Journal of Technology Diffusion (IJTD) 13, no.1: 1-22. http://doi.org/10.4018/IJTD.313643

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The internet of things offers a rich set of options and applications in different fields, such as smart home, agriculture, security, transportation, and health issues. The IoT aims at organizing the interactions between items that are both sensors and actuators, known as objects. These objects acquire new applications in our lives that facilitate the remote control of smart devices via the open channel. However, this makes the sensitive transmitted data easily reachable and vulnerable to many attacks. With this in mind, security and privacy become an essential requirement that precedes the deployment of any IoT network. In this paper, the authors provide an IoT authentication and key agreement scheme using ECC and a fuzzy extractor and then they use BAN logic model and AVISPA tool to demonstrate the security of the scheme. They show that the proposed scheme is resistant to various attacks. Furthermore, the security analysis of the proposed scheme and its comparison with some other related works have shown that the proposed scheme is both more efficient and more secure than the other ones.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.