Skip to main content

Advertisement

Log in

Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The persons supporting the cloud computing model also support that the Edge, Fog and Dew models, which give users a nicer experience. The dew server is a cloud server on the local PC. In this continuation, Dew for IoT systems (may name as “IoT-enabled Dew”) is another new computing model. As communication in these systems occurs over an open channel, many security concerns come into the picture, and the same applies to IoT in Dew. Thus, it is necessary to focus on authorization in data access, secure session establishment, and user privacy to have confidence in the system and data secrecy. As cloud servers do not completely control data, security and authorized access remain key concerns in Dew. There is a need for a secure interaction between a sensor device and a user. This can be fulfilled after creating a session key between these two entities. The existing schemes based on factorization and discrete logs present in various literature support the creation of the session key in the dew-assisted system and are secure in the pre-quantum era, which may not be suitable for the post-quantum era. This paper proposes a quantum secure and efficient authenticated key agreement scheme. We present the formal security of the proposed scheme, which shows that once the credential database is threatened, the opponent cannot obtain any private information about the user even if the number of trials using the random oracle model (ROM) by the probabilistic polynomial time (PPT) opponent exceeds a threshold number. We also include a comprehensive performance evaluation and comparative study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Guo, Y., Mi, Z., Yang, Y., Ma, H., Obaidat, M.S.: Efficient network resource preallocation on demand in multitenant cloud systems. IEEE Syst. J. 13(4), 4027–4038 (2019)

    Article  MATH  Google Scholar 

  2. Vora, J., Kaneriya, S., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M.: TILAA: tactile internet-based ambient assistant living in fog environment. Futur. Gener. Comput. Syst. 98, 635–649 (2019)

    Article  MATH  Google Scholar 

  3. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)

  4. Pradeepa, M.A.M., Gomathi, B.: Towards fog computing based cloud sensor integration for internet of things. In. J. Comput. Sci. Eng. Commun. 5(6), 1761–1773 (2017)

    MATH  Google Scholar 

  5. Sharma, B., Obaidat, M.S.: Comparative analysis of IoT based products, technology and integration of IoT with cloud computing. IET Netw. 9(2), 43–47 (2019)

    Article  MATH  Google Scholar 

  6. Naik, B., Obaidat, M.S., Nayak, J., Pelusi, D., Vijayakumar, P., Islam, S.H.: Intelligent secure ecosystem based on metaheuristic and functional link neural network for edge of things. IEEE Trans. Industr. Inf. 16(3), 1947–1956 (2020)

    Article  Google Scholar 

  7. Garg, S., Singh, A., Kaur, K., Aujla, G.S., Batra, S., Kumar, N., Obaidat, M.S.: Edge computing-based security framework for big data analytics in vanets. IEEE Netw. 33(2), 72–81 (2019)

    Article  MATH  Google Scholar 

  8. Šojat, Z., Skala, K.: Views on the role and importance of dew computing in the service and control technology. In: 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 164–168. IEEE (2016)

  9. Gordienko, Y., Stirenko, S., Alienin, O., Skala, K., Sojat, Z., Rojbi, A., Benito, J.L., González, E.A., Lushchyk, U., Sajn, L.: Augmented coaching ecosystem for non-obtrusive adaptive personalized elderly care on the basis of cloud-fog-dew computing paradigm. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 359–364. IEEE (2017)

  10. Ray, P.P.: An introduction to dew computing: definition, concept and implications. IEEE Access 6, 723–737 (2017)

    Article  MATH  Google Scholar 

  11. Tao, D., Ma, P., Obaidat, M.S.: Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. Int. J. Commun. Syst. 32(14), e4099 (2019)

    Article  Google Scholar 

  12. Gupta, D.S., Islam, S.H., Obaidat, M.S.: A secure identity-based three-party authenticated key agreement protocol using bilinear pairings. In: International Conference on Innovative Data Communication Technologies and Application, pp. 1–11. Springer (2019)

  13. Wu, T.-Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.-M.: An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8, 28096–28108 (2020)

    Article  Google Scholar 

  14. Meshram, C., Obaidat, M.S., Lee, C.-C., Meshram, S.G.: An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. (2020). https://doi.org/10.1007/s00500-020-04768-0

    Article  MATH  Google Scholar 

  15. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1–8. IEEE (2014)

  16. Wang, Y.: Cloud-dew architecture. Int. J. Cloud Comput. 4(3), 199–210 (2015)

    Article  MATH  Google Scholar 

  17. Wang, Y.: Definition and categorization of dew computing. Open J. Cloud Comput. (OJCC) 3(1), 1–7 (2016)

    MATH  Google Scholar 

  18. Rindos, A., Wang, Y.: Dew computing: the complementary piece of cloud computing. In: IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), pp. 15–20. IEEE (2016)

  19. Sojaat, Z., Skalaa, K.: The dawn of dew: dew computing for advanced living environment. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 347–352. IEEE (2017)

  20. Ristov, S., Cvetkov, K., Gusev, M.: Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput. Pract. Exp. 17(2), 79–90 (2016)

    MATH  Google Scholar 

  21. Dolui, K., Datta, S.K.: Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2017)

  22. Gusev, M.: A dew computing solution for IoT streaming devices. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 387–392. IEEE (2017)

  23. Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.: Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Depend. Secur. Comput. (2018). https://doi.org/10.1109/TDSC.2018.2828306

    Article  MATH  Google Scholar 

  24. Patel, H.M., Chaudhari, R.R., Prajapati, K.R., Patel, A.A.: The interdependent part of cloud computing: dew computing. In: Intelligent Communication and Computational Technologies, pp. 345–355. Springer (2018)

  25. Mane, T.S., Agrawal, H.: Cloud-fog-dew architecture for refined driving assistance: the complete service computing ecosystem. In: 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–7. IEEE (2017)

  26. Botta, A., Gallo, L., Ventre, G.: Cloud, fog, and dew robotics: architectures for next generation applications. In: 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 16–23. IEEE (2019)

  27. Hati, S., De, D., Mukherjee, A.: Dewbcity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities. J. Supercomput. 78(6), 8977–8997 (2022)

    Article  MATH  Google Scholar 

  28. Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Futur. Gener. Comput. Syst. 91, 475–492 (2019)

    Article  Google Scholar 

  29. Rana, S., Obaidat, M.S., Mishra, D., Mishra, A., Rao, Y.S.: Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. J. Supercomput. (2022). https://doi.org/10.1007/s11227-021-04003-z

    Article  MATH  Google Scholar 

  30. Ma, Y., Ma, Y., Cheng, Q.: Cryptanalysis and enhancement of an authenticated key agreement protocol for dew-assisted IoT systems. Secur. Commun. Netw. (2022). https://doi.org/10.1155/2022/7125491

    Article  MATH  Google Scholar 

  31. Braeken, A.: Authenticated key agreement protocols for dew-assisted IoT systems. J. Supercomput. 78(10), 12093–12113 (2022)

    Article  MATH  Google Scholar 

  32. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science, pp. 124–134. IEEE (1994)

  33. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  34. Ding, J., Alsayigh, S., Lancrenon, J., Saraswathy, R., Snook, M.: Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Cryptographers Track at the RSA Conference, pp. 183–204. Springer (2017)

  35. Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206 (2008)

  36. Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  37. Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM (JACM) 60(6), 1–35 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  38. Zhang, J., Zhang, Z., Ding, J., Snook, M., Dagdelen, Ö.: Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719–751. Springer (2015)

  39. Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland. Proceedings 8, pp. 65–84. Springer (2005)

  40. Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive (2004)

Download references

Funding

Not applicable

Author information

Authors and Affiliations

Authors

Contributions

Author Names: DM, KP, MS, and AM. Contribution: The authors confirm their contribution to the paper as follows: Analysis of Existing protocol’s security and efficiency: KP. Designing the protocol: DM. Discussion on protocol security and Efficiency: MS Designing the proof and discussing the proof of security: AM. Analysis of performance and Comparative Study: DM. Wrote the main manuscript text: Komal Pursharthi and Ankita Mishra. Proofreading: DM and MS. All authors reviewed the results and approved the final version of the manuscript.

Corresponding author

Correspondence to Dheerendra Mishra.

Ethics declarations

Conflict of interest

The author would like to report that they have no conflicts.

Consent to publish

All authors give their Consent to publish.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, D., Pursharthi, K., Singh, M. et al. Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems. Int. J. Inf. Secur. 24, 19 (2025). https://doi.org/10.1007/s10207-024-00932-x

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10207-024-00932-x

Keywords

Navigation