Smart City Gnosys

Smart city article details

Title Scyther Validated Session Key Establishment In Iot
ID_Doc 47465
Authors Maqbool A.; Islam M.U.; Iqbal U.; Dar A.H.
Year 2019
Published 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019
DOI http://dx.doi.org/10.1109/ICACCS.2019.8728318
Abstract Key agreement is a bed rock of all security services and primitives. Asymmetric cryptography is a widely adopted method for negotiating a session key over an insecure communication channel. The usage of asymmetric cryptography for key agreement based on elliptical curve cryptography in IoT is of considerable research interest. This owning to the fact that ECC based cryptography is computational less intense than traditional cryptography. The computational effectiveness makes it suitable for resource constraint devices used in IOT and smart city application. In this paper, a de-facto key exchange protocol, Elliptical Curve Diffie-Hellman(ECDH) is evaluated and formally validated.The limitations of ECDH are also pointed out. A session key agreement scheme based on elliptical curve cryptography has been suggested. The scheme has also been simulated in Scyther to validate it against various attacks. © 2019 IEEE.
Author Keywords ECC; IOT; Scyther; Session Key


Similar Articles


Id Similarity Authors Title Published
4458 View0.876Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
47539 View0.865Frimpong E.; Michalas A.Secon-Ng: Implementing A Lightweight Cryptographic Library Based On Ecdh And Ecdsa For The Development Of Secure And Privacy-Preserving Protocols In Contiki-NgProceedings of the ACM Symposium on Applied Computing (2020)
35248 View0.856Mishra S.; Mondal B.; Jha R.K.Lightweight Authentication Scheme Based On Ecc For IotSN Computer Science, 5, 7 (2024)
23109 View0.855Ullah S.; Nasir H.M.; Kadir K.; Khan A.; Memon A.; Azhar S.; Khan I.; Ashraf M.End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme For Resource Constrained Iot NetworkComputers, Materials and Continua, 82, 2 (2025)