Proceedings of the International Conference on Computational Innovations and Emerging Trends (ICCIET- 2024)

Lightweight authenticated key agreement scheme for Cloud-assisted Internet of Things

Authors
Bommepalli Narayana Reddy1, 2, *, B. Raja Koti3
1Academic Consultant, GDT Department, DrYSR Architecture and Fine Arts University, Kadapa, AP, India
2Part-timeResearch Scholar,GITAMUniversity, Visakhapatnam, India
3Assistant Professor, CSE DepartmentGITAMUniversity, Visakhapatnam, A.P, India
*Corresponding author. Email: nbommepa@gitam.in
Corresponding Author
Bommepalli Narayana Reddy
Available Online 30 July 2024.
DOI
10.2991/978-94-6463-471-6_122How to use a DOI?
Keywords
Internet of Things (IoTs); Authentication; Key Management; Lightweight Cryptography; Cloud Server; Security
Abstract

Internet of Things (IoTs) devices face power constraints, manufacturers increasingly focus on group communication for their applications. Such communication heavily relies on a dependable, efficient, and verifiable group secret key. Blockchain technology has the power to solve the problems because it is decentralized, secure, and private. The Internet of Things poses unique challenges for authentication and key management methods due to resource constraints and placement of constituent devices in places where physical access to the devices is possible.This paper introduces an innovative authenticated key management system for Cloud-Assisted Industrial Internet of Things. The protocol addresses the issue of a single point of failure while preserving the security attributes of the existing system. We propose ways for implementing lightweight authenticated key management schemes that are specifically designed for various design processes.Atechnique that requires authentication is implemented using elliptic curve and hash algorithms. This scheme also offers the functionality of adding and removing clients, as well as ensuring the freshness of keys. We conducted an empirical investigation using a proposed method and evaluated its performance using the Scyther verification tool. The topics of security analysis and computational complexity have also been addressed. We conclude by outlining potential future research directions.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computational Innovations and Emerging Trends (ICCIET- 2024)
Series
Advances in Computer Science Research
Publication Date
30 July 2024
ISBN
978-94-6463-471-6
ISSN
2352-538X
DOI
10.2991/978-94-6463-471-6_122How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Bommepalli Narayana Reddy
AU  - B. Raja Koti
PY  - 2024
DA  - 2024/07/30
TI  - Lightweight authenticated key agreement scheme for Cloud-assisted Internet of Things
BT  - Proceedings of the International Conference on Computational Innovations and Emerging Trends (ICCIET- 2024)
PB  - Atlantis Press
SP  - 1272
EP  - 1284
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-471-6_122
DO  - 10.2991/978-94-6463-471-6_122
ID  - Reddy2024
ER  -