Next Article in Journal
BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance
Previous Article in Journal
External Breaking Vibration Identification Method of Transmission Line Tower Based on Solar-Powered RFID Sensor and CNN
Previous Article in Special Issue
Sensitive, Linear, Robust Current-To-Time Converter Circuit for Vehicle Automation Application
Open AccessFeature PaperArticle

An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices

1
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Avcılar, 34310 Istanbul, Turkey
3
Department of Cyber Security, Ajou University San 5, Woncheon-Dong, Yeongtong-Gu, Suwon 443-749, Korea
*
Authors to whom correspondence should be addressed.
Electronics 2020, 9(3), 520; https://doi.org/10.3390/electronics9030520
Received: 13 February 2020 / Revised: 12 March 2020 / Accepted: 17 March 2020 / Published: 21 March 2020
Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows–Abadi–Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments. View Full-Text
Keywords: Internet of Things; V2V Security; Internet of Vehicles; key compromise impersonation attack; 2PAKA Internet of Things; V2V Security; Internet of Vehicles; key compromise impersonation attack; 2PAKA
Show Figures

Figure 1

MDPI and ACS Style

Alzahrani, B.A.; Chaudhry, S.A.; Barnawi, A.; Al-Barakati, A.; Shon, T. An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices. Electronics 2020, 9, 520.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop