GET THE APP

..

Telecommunications System & Management

ISSN: 2167-0919

Open Access

A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT

Abstract

Tinashe Magara

User authentication for the Internet of Things (IoT) is a vital measure as it consists of numerous unattended connected devices and sensors. For security, only the user authenticated by the gateway node can access the real-time data gathered by sensor nodes. We present an efficient privacy-preserving authentication and key agreement scheme for IoT, which enables the user, the gateway node and sensor nodes to authenticate with each other. Only the trusted gateway node can determine the real identity of the user; however, no other entities can get information about user’ identity by just intercepting all exchanged Cyber threats are a global risk that governments, the private sector, non-governmental organizations – and the global community as a whole – must deal with. Chatham House focuses on building cyber capacity and expertise among policymakers, investigating key issues through publishing in-depth policy research, conducting cyber simulation exercises, and convening high-level meetings with a wide group of stakeholders. messages during authentication phase. The gateway cannot prove the received messages from the sender to a third party, and thus preserving the privacy of the sender. The correctness of the proposed scheme is proved to be feasible by using BAN logic, and its security is proved under the random oracle model. The execution time of the proposed scheme is evaluated and compared with existing similar schemes, and the results demonstrate that our proposed scheme is more efficient and applicable for IoT applications. The economic and social benefits of digital technology have transformed the world as we know it, but have introduced high risks through its malicious use by both state and non-state actors. These risks affecting economies, societies and livelihoods, and are threatening international peace and security.

PDF

Share this article

arrow_upward arrow_upward