EconPapers    
Economics at your fingertips  
 

A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment

Ali Peivandizadeh, Haitham Y. Adarbah (), Behzad Molavi, Amirhossein Mohajerzadeh and Ali H. Al-Badi
Additional contact information
Ali Peivandizadeh: Technology Project Management, University of Houston, Houston, TX 77204, USA
Haitham Y. Adarbah: Centre for Foundation Studies, Gulf College, Muscat 133, Oman
Behzad Molavi: Centre for Foundation Studies, Gulf College, Muscat 133, Oman
Amirhossein Mohajerzadeh: Department of Computing and Information Technology, Sohar University, Sohar 311, Oman
Ali H. Al-Badi: Centre for Foundation Studies, Gulf College, Muscat 133, Oman

Future Internet, 2024, vol. 16, issue 10, 1-25

Abstract: In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era. Among the applications that can be mentioned for this network are the field of electronic health, smart residential complexes, and a wide level of connections that have connected the inner-city infrastructure in a complex way to make it smart. The notable and critical issue that exists in this network is the extent of the elements that make up the network and, due to this, the strong and massive data exchanges at the network level. With the increasing deployment of the Internet of Things, a wide range of challenges arise, especially in the discussion of establishing network security. Regarding security concerns, ensuring the confidentiality of the data being exchanged in the network, maintaining the privacy of the network nodes, protecting the identity of the network nodes, and finally implementing the security policies required to deal with a wide range of network cyber threats are of great importance. A fundamental element in the security of IoT networks is the authentication process, wherein nodes are required to validate each other’s identities to ensure the establishment of secure communication channels. Through the enforcement of security prerequisites, in this study, we suggested a security protocol focused on reinforcing security characteristics and safeguarding IoT nodes. By utilizing the security features provided by Elliptic Curve Cryptography (ECC) and employing the Elliptic Curve Diffie–Hellman (ECDH) key-exchange mechanism, we designed a protocol for authenticating nodes and establishing encryption keys for every communication session within the Internet of Things. To substantiate the effectiveness and resilience of our proposed protocol in withstanding attacks and network vulnerabilities, we conducted evaluations utilizing both formal and informal means. Furthermore, our results demonstrate that the protocol is characterized by low computational and communication demands, which makes it especially well-suited for IoT nodes operating under resource constraints.

Keywords: authentication protocol; key-agreement protocol; IoT security; mutual authentication; network security (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/16/10/357/pdf (application/pdf)
https://www.mdpi.com/1999-5903/16/10/357/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:16:y:2024:i:10:p:357-:d:1489791

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:16:y:2024:i:10:p:357-:d:1489791