Abstract
The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of security and performance. The results confirm the security and efficiency of the propose scheme compared to others.


Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abomhara M, Køien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on IEEE, pp 1–8
Axelrod CW (2015) Enforcing security, safety and privacy for the internet of things. In: Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, IEEE, pp 1–6
Bohli JM, Skarmeta A, Moreno MV, García D, Langendörfer P (2015) Smartie project: Secure iot data management for smart cities. In: Recent Advances in Internet of Things (RIoT), 2015 International Conference on IEEE, pp 1–6
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A 426(1871):233–271
Cai Z, Feng Y, Zhang J, Gan Y, Zhang Q (2015) A chebyshev-map based one-way authentication and key agreement scheme for multi-server environment. Int J Secur Appl 9(6):147–56
Cavoukian A, Chibba M (2016) Cognitive cities, big data and citizen participation: The essentials of privacy and security. In: Towards Cognitive Cities, Springer, pp 61–82
Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing
Chung H (2013) Chaos based rfid authentication protocol. PhD thesis, Université d’Ottawa/University of Ottawa
Cong G, Zj Zhang, Zhu Lh, Ya Tan, Zhen Y (2014) A novel secure group rfid authentication protocol. J China Univ Posts Telecommun 21(1):94–103
Crossman MA, Liu H (2015) Study of authentication with iot testbed. In: Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, IEEE, pp 1–7
Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, IEEE, pp 922–926
Erguler I (2015) A potential weakness in rfid-based internet-of-things systems. Pervasive Mobile Comput 20:115–126
Flood P, Schukat M (2014) Peer to peer authentication for small embedded systems. In: Proceedings of 10th international conference on digital technology, pp 68–72
Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing rfid system. Comput Secur 55:271–280
Griffin PH (2014) Telebiometric authentication objects. Procedia Comput Sci 36:393–400
Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):9919. https://doi.org/10.1007/s10916-012-9919-y
Huaxin S, Qi X, Xiaodong L, Baoyan L, Shusong M, Xuezhong Z (2012) Constructing ideas of health service platform for the elderly. In: e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on IEEE, pp 526–529
Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst (TIIS) 10(12):5572–5595
Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708
Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):12
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481–2501
Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223
Kamesh S, Priya S (2014) Security enhancement of authenticated rfid generation. Int J Appl Eng Res 9(22):5968–5974
Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723
Lee TF (2015a) Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf Sci 290:63–71
Lee TF (2015b) Provably secure anonymous single-sign-on authentication mechanisms using extended chebyshev chaotic maps for distributed computer networks. IEEE Systems Journal
Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77
Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233
Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener Comput Syst 84:149–159
Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84(2):549–557
Mishra D, Srinivas J, Mukhopadhyay S (2014) A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J Med Syst 38(10):120
Mohammad AAK, Mirza A, Vemuru S (2016) Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks. Indian Journal of Science and Technology 9(26):
Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. Procedia Comput Sci 32:198–206
Ning H (2016) Unit and ubiquitous internet of things. CRC Press, Boca Raton
Ning H, Wang Z (2011) Future internet of things architecture: like mankind neural system or social organization framework? IEEE Commun Lett 15(4):461–463
Ning H, Liu H, Yang L (2015) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 1:1–1
Pöhls HC, Angelakis V, Suppan S, Fischer K, Oikonomou G, Tragos EZ, Rodriguez RD, Mouroutis T (2014) Rerum: Building a reliable iot upon privacy-and security-enabled smart objects. In: Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, IEEE, pp 122–127
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279
Sarvabhatla M, Vorugunti CS (2014) A secure biometric-based user authentication scheme for heterogeneous wsn. In: Emerging Applications of Information Technology (EAIT), 2014 Fourth International Conference of, IEEE, pp 367–372
Shivraj V, Rajan M, Singh M, Balamuralidhar P (2015) One time password authentication scheme based on elliptic curves for internet of things (iot). In: Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, IEEE, pp 1–6
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2016) A privacy preserving communication protocol for iot applications in smart homes. In: Identification, Information and Knowledge in the Internet of Things (IIKI), 2016 International Conference on, IEEE, pp 519–524
Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V (2013) Smart cities built on resilient cloud computing and secure internet of things. In: Control systems and computer science (CSCS), 2013 19th International Conference on, IEEE, pp 513–518
Wu F, Xu L, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Humaniz Comput 8(1):101–116
Wu ST, Chiu JH, Chieu BC (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: Electro Information Technology, 2005 IEEE International Conference on, IEEE, p 5
YANG Jc, Hao P, X ZHANG (2013) Enhanced mutual authentication model of iot. J China Univ Posts Telecommun 20:69–74
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674
Zhang L, Zhu S, Tang S (2017a) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465–475
Zhang L, Zhu S, Tang S (2017b) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465–475
Zhang Z, Wang H, Gao Y (2015) C2mp: Chebyshev chaotic map-based authentication protocol for rfid applications. Personal Ubiquitous Comput 19(7):1053–1061
Zhen P, Zhao G, Min L, Li X (2014) Key agreement protocol based on extended chaotic maps with anonymous authentication. Chaotic Model Simul (CMSIM0) 3(3):221–31
Zheng Q, Wang X, Khan MK, Zhang W, Gupta B, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722
Zhou H (2012) The internet of things in the cloud: a middleware perspective. CRC Press, Boca Raton
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Rights and permissions
About this article
Cite this article
Akbarzadeh, A., Bayat, M., Zahednejad, B. et al. A lightweight hierarchical authentication scheme for internet of things. J Ambient Intell Human Comput 10, 2607–2619 (2019). https://doi.org/10.1007/s12652-018-0937-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0937-6