Next Article in Journal
Experimental Study on Whole Wind Power Structure with Innovative Open-Ended Pile Foundation under Long-Term Horizontal Loading
Next Article in Special Issue
Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks
Previous Article in Journal
Generation of Vortex Optical Beams Based on Chiral Fiber-Optic Periodic Structures
Previous Article in Special Issue
Data Improvement Model Based on ECG Biometric for User Authentication and Identification
Open AccessArticle

A Lightweight Authentication and Key Agreement Schemes for IoT Environments

Department of Computer Science and Engineering, Soonchunhyang University, Asan 31538, Korea
Author to whom correspondence should be addressed.
Sensors 2020, 20(18), 5350;
Received: 10 August 2020 / Revised: 16 September 2020 / Accepted: 16 September 2020 / Published: 18 September 2020
(This article belongs to the Special Issue Intelligent and Adaptive Security in Internet of Things)
In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu–Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory. View Full-Text
Keywords: ECQV implicit certificate; CL-PKC; authentication; key agreement ECQV implicit certificate; CL-PKC; authentication; key agreement
Show Figures

Figure 1

MDPI and ACS Style

Lee, D.-H.; Lee, I.-Y. A Lightweight Authentication and Key Agreement Schemes for IoT Environments. Sensors 2020, 20, 5350.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop