
Research Article
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
@INPROCEEDINGS{10.1007/978-3-031-30623-5_2, author={Yongliu Ma and Yuqian Ma and Qingfeng Cheng}, title={An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server}, proceedings={Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings}, proceedings_a={SPNCE}, year={2023}, month={4}, keywords={IoT AKA protocol eCK model Scyther formal tool}, doi={10.1007/978-3-031-30623-5_2} }
- Yongliu Ma
Yuqian Ma
Qingfeng Cheng
Year: 2023
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
SPNCE
Springer
DOI: 10.1007/978-3-031-30623-5_2
Abstract
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, research on the security of authenticated key agreement (AKA) protocols in the IoT environment has gradually increased. Iqbal et al. proposed an AKA protocol between IoT and cloud servers and proved that it was secure under the eCK model. This paper shows that the Iqbal et al.’s protocol has two security flaws, which are resisting ephemeral key leakage attack and key compromise impersonation attack, and proposes a new AKA protocol in the IoT environment. Through the security proof and formal analysis, it is proved that the new protocol is secure under the eCK model. Comparing the protocol proposed in this paper with other similar protocols, it is found that the protocol in this paper achieves a balance between security performance and communication consumption.