Abstract
The idea of an internet of things (IoT)-based smart city evolves with the aim of improving the quality of citizens’ lives through the practice of data and announcement (such as email, connection, etc.) tools. The idea of smart cities is believed to be feasible through the incorporation of new technologies such as IoT, automation and machine learning in which IoT plays a key role. When billions of slight strategies drive online and start sharing their information, confirmation has already described as a major security issue nearby the IoT. To exacerbate things, as internet technology advances, advanced hacker methods and new forms of threats arise after each other. It is, therefore, necessary to create efficient authentication protocol that is simpler and easier in order to free users from their anxiety and enhance their user experience. Smart card-based key authentication protocols have formed the normal in the latest years, featuring their exceptionally lightweight, easy-to-use equipment and low-cost apps. We proposed an efficient robust authentication protocol using the extended chaotic map in this article. The security of the proposed authentication protocol formally and informally evaluated to demonstrate robustness. Examination of the quality of the proposed authentication protocol has also given sufficient care of demonstrating the possibility of application in real-time requests.
Similar content being viewed by others
References
Algehawi MB, Samsudin A (2010) A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. PhysLett A 374:4670–4674
Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst-I 52(7):1382–1393
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36
Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290–306
Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377–389
Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362
Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848–3856
Das AK, Odelu V, Goswami A (2014) A robust and effective smart-card-based remote user authentication mechanism using hash function. Sci World J. https://doi.org/10.1155/2014/719470
Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879
Friese I, Heuer J, Kong N (2014) Challenges from the identities of things: introduction of the identities of things discussion group within Kantara initiative. In: Internet of things (WF-IoT), 2014 IEEE World Forum, pp 1–4
Gubbi J, Buyya R, Marusic S, Marimuthu Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Soliton and Fract 39(3):1283–1289
Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37–50
Islam SKH (2016) Design and analysis of an improved smartcard–based remote user password authentication scheme. Int J Commun Syst 29(11):1708–1719
Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers, Springer, USA, pp 571–576
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology (Crypto’99), LNCS. Springer, Berlin, Heidelberg, pp 388–397
Kumari S, Khan MK (2014) Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939–3955
Lewis N (2016) IoT tutorial: Mitigating security risks in connected environments. http://searchitchannel.techtarget.com/feature/IoT-tutorial-Mitigating-security-risks-in-connected-environments
Li S, Xu LD (2017) Book excerpt: ‘securing the internet of things’. http://internetofthingsagenda.techtarget.com/feature/Book-excerpt-Securing-the-Internet-of-Things
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371
Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569–597
Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288
Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227
Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton
McDonald C (2014). Premium wearables to push sales growth, say juniper. http://www.computerweekly.com/news/2240230260/Premium-wearables-topush-sales-growth-say-Juniper
Meshram C, Li CT, Meshram SG (2019a) An efficient online/offline id-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753
Meshram C, Lee CC, Meshram SG, Li CT (2019b) An efficient id-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946
Meshram C, Lee CC, Meshram SG, Khan MK (2019c) An Identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127–13138
Meshram C, Lee CC, Meshram SG, Ramteke RJ, Meshram A (2020) An efficient mobile-healthcare emergency framework. J Med Syst 44:58
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Mick T, Tourani R, Misra S (2017) Laser: lightweight authentication and secured routing for NDN IoT in smart cities. arXiv preprint arXiv:1703.08453
Qi M, Chen J (2017) An efficient two-party authentication key exchange protocol for mobile environment. Int J Commun Syst 30(16):e3341
Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Urban Areas 41:878–885
Rouse M, Shea S, Burns E (2016a) Smart city. http://internetofthingsagenda.techtarget.com/definition/smart-city
Rouse M, Rosencrance L, Shea S, Wigmore I (2016b) Internet of things (IoT). http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
Scroxton A (2015) Robust security and consumer buy-in needed for smart city success. http://www.computerweekly.com/news/2240240594/Robustsecurity-and-consumer-buy-in-needed-for-smart-city-success
Song R (2010) Advanced smartcard based password authentication protocol. Comput Stand Interfaces 32(5):321–325
Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 international conference on security and management, Las Vegas, pp 323–329
Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.’s authentication scheme using smartcards. In: Proceedings of the 3rd annual ACM Bangalore conference, Bangalore, Karnataka, India, pp 17–25
Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639–1644
Tech Target (2017) IoT security. http://searchcio.techtarget.com/essentialguide/An-IT-security-strategy-guide-for-CIOs#guideSection5
Till A (2017) The smart way to build smart cities. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-smartway-to-build-smart-cities
Xu J, Zhu WT, Feng DG (2009) An improved smartcard based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723–728
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669–674
Acknowledgements
The authors would like to thank anonymous reviewers of Soft Computing for their careful and helpful comments.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Meshram, C., Ibrahim, R.W., Deng, L. et al. A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput 25, 10037–10051 (2021). https://doi.org/10.1007/s00500-021-05929-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-05929-5