About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings

Research Article

An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-30623-5_2,
        author={Yongliu Ma and Yuqian Ma and Qingfeng Cheng},
        title={An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server},
        proceedings={Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings},
        proceedings_a={SPNCE},
        year={2023},
        month={4},
        keywords={IoT AKA protocol eCK model Scyther formal tool},
        doi={10.1007/978-3-031-30623-5_2}
    }
    
  • Yongliu Ma
    Yuqian Ma
    Qingfeng Cheng
    Year: 2023
    An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
    SPNCE
    Springer
    DOI: 10.1007/978-3-031-30623-5_2
Yongliu Ma, Yuqian Ma, Qingfeng Cheng,*
    *Contact email: qingfengc2008@sina.com

    Abstract

    The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, research on the security of authenticated key agreement (AKA) protocols in the IoT environment has gradually increased. Iqbal et al. proposed an AKA protocol between IoT and cloud servers and proved that it was secure under the eCK model. This paper shows that the Iqbal et al.’s protocol has two security flaws, which are resisting ephemeral key leakage attack and key compromise impersonation attack, and proposes a new AKA protocol in the IoT environment. Through the security proof and formal analysis, it is proved that the new protocol is secure under the eCK model. Comparing the protocol proposed in this paper with other similar protocols, it is found that the protocol in this paper achieves a balance between security performance and communication consumption.

    Keywords
    IoT AKA protocol eCK model Scyther formal tool
    Published
    2023-04-26
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-031-30623-5_2
    Copyright © 2022–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL