Skip to main content
Log in

A lightweight hierarchical authentication scheme for internet of things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of security and performance. The results confirm the security and efficiency of the propose scheme compared to others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Abomhara M, Køien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on IEEE, pp 1–8

  • Axelrod CW (2015) Enforcing security, safety and privacy for the internet of things. In: Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, IEEE, pp 1–6

  • Bohli JM, Skarmeta A, Moreno MV, García D, Langendörfer P (2015) Smartie project: Secure iot data management for smart cities. In: Recent Advances in Internet of Things (RIoT), 2015 International Conference on IEEE, pp 1–6

  • Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A 426(1871):233–271

    Article  MathSciNet  MATH  Google Scholar 

  • Cai Z, Feng Y, Zhang J, Gan Y, Zhang Q (2015) A chebyshev-map based one-way authentication and key agreement scheme for multi-server environment. Int J Secur Appl 9(6):147–56

    Google Scholar 

  • Cavoukian A, Chibba M (2016) Cognitive cities, big data and citizen participation: The essentials of privacy and security. In: Towards Cognitive Cities, Springer, pp 61–82

  • Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing

  • Chung H (2013) Chaos based rfid authentication protocol. PhD thesis, Université d’Ottawa/University of Ottawa

  • Cong G, Zj Zhang, Zhu Lh, Ya Tan, Zhen Y (2014) A novel secure group rfid authentication protocol. J China Univ Posts Telecommun 21(1):94–103

    Article  Google Scholar 

  • Crossman MA, Liu H (2015) Study of authentication with iot testbed. In: Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, IEEE, pp 1–7

  • Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, IEEE, pp 922–926

  • Erguler I (2015) A potential weakness in rfid-based internet-of-things systems. Pervasive Mobile Comput 20:115–126

    Article  Google Scholar 

  • Flood P, Schukat M (2014) Peer to peer authentication for small embedded systems. In: Proceedings of 10th international conference on digital technology, pp 68–72

  • Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing rfid system. Comput Secur 55:271–280

    Article  Google Scholar 

  • Griffin PH (2014) Telebiometric authentication objects. Procedia Comput Sci 36:393–400

    Article  Google Scholar 

  • Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):9919. https://doi.org/10.1007/s10916-012-9919-y

    Article  Google Scholar 

  • Huaxin S, Qi X, Xiaodong L, Baoyan L, Shusong M, Xuezhong Z (2012) Constructing ideas of health service platform for the elderly. In: e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on IEEE, pp 526–529

  • Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst (TIIS) 10(12):5572–5595

    Google Scholar 

  • Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  • Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):12

    Article  Google Scholar 

  • Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481–2501

    Article  Google Scholar 

  • Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223

    Article  Google Scholar 

  • Kamesh S, Priya S (2014) Security enhancement of authenticated rfid generation. Int J Appl Eng Res 9(22):5968–5974

    Google Scholar 

  • Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723

    Article  Google Scholar 

  • Lee TF (2015a) Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf Sci 290:63–71

    Article  MATH  Google Scholar 

  • Lee TF (2015b) Provably secure anonymous single-sign-on authentication mechanisms using extended chebyshev chaotic maps for distributed computer networks. IEEE Systems Journal

  • Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77

    Article  Google Scholar 

  • Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233

    Article  Google Scholar 

  • Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener Comput Syst 84:149–159

    Article  Google Scholar 

  • Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84(2):549–557

    Article  MathSciNet  MATH  Google Scholar 

  • Mishra D, Srinivas J, Mukhopadhyay S (2014) A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J Med Syst 38(10):120

    Article  Google Scholar 

  • Mohammad AAK, Mirza A, Vemuru S (2016) Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks. Indian Journal of Science and Technology 9(26):

  • Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. Procedia Comput Sci 32:198–206

    Article  Google Scholar 

  • Ning H (2016) Unit and ubiquitous internet of things. CRC Press, Boca Raton

    Book  Google Scholar 

  • Ning H, Wang Z (2011) Future internet of things architecture: like mankind neural system or social organization framework? IEEE Commun Lett 15(4):461–463

    Article  Google Scholar 

  • Ning H, Liu H, Yang L (2015) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 1:1–1

    Google Scholar 

  • Pöhls HC, Angelakis V, Suppan S, Fischer K, Oikonomou G, Tragos EZ, Rodriguez RD, Mouroutis T (2014) Rerum: Building a reliable iot upon privacy-and security-enabled smart objects. In: Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, IEEE, pp 122–127

  • Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

    Article  Google Scholar 

  • Sarvabhatla M, Vorugunti CS (2014) A secure biometric-based user authentication scheme for heterogeneous wsn. In: Emerging Applications of Information Technology (EAIT), 2014 Fourth International Conference of, IEEE, pp 367–372

  • Shivraj V, Rajan M, Singh M, Balamuralidhar P (2015) One time password authentication scheme based on elliptic curves for internet of things (iot). In: Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, IEEE, pp 1–6

  • Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  • Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2016) A privacy preserving communication protocol for iot applications in smart homes. In: Identification, Information and Knowledge in the Internet of Things (IIKI), 2016 International Conference on, IEEE, pp 519–524

  • Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V (2013) Smart cities built on resilient cloud computing and secure internet of things. In: Control systems and computer science (CSCS), 2013 19th International Conference on, IEEE, pp 513–518

  • Wu F, Xu L, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Humaniz Comput 8(1):101–116

    Article  Google Scholar 

  • Wu ST, Chiu JH, Chieu BC (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: Electro Information Technology, 2005 IEEE International Conference on, IEEE, p 5

  • YANG Jc, Hao P, X ZHANG (2013) Enhanced mutual authentication model of iot. J China Univ Posts Telecommun 20:69–74

    Article  Google Scholar 

  • Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674

    Article  MathSciNet  MATH  Google Scholar 

  • Zhang L, Zhu S, Tang S (2017a) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465–475

    Article  Google Scholar 

  • Zhang L, Zhu S, Tang S (2017b) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465–475

    Article  Google Scholar 

  • Zhang Z, Wang H, Gao Y (2015) C2mp: Chebyshev chaotic map-based authentication protocol for rfid applications. Personal Ubiquitous Comput 19(7):1053–1061

    Article  Google Scholar 

  • Zhen P, Zhao G, Min L, Li X (2014) Key agreement protocol based on extended chaotic maps with anonymous authentication. Chaotic Model Simul (CMSIM0) 3(3):221–31

    Google Scholar 

  • Zheng Q, Wang X, Khan MK, Zhang W, Gupta B, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722

    Article  Google Scholar 

  • Zhou H (2012) The internet of things in the cloud: a middleware perspective. CRC Press, Boca Raton

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Bayat.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akbarzadeh, A., Bayat, M., Zahednejad, B. et al. A lightweight hierarchical authentication scheme for internet of things. J Ambient Intell Human Comput 10, 2607–2619 (2019). https://doi.org/10.1007/s12652-018-0937-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0937-6

Keywords

Navigation