Open Access
ARTICLE
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
1 Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India
2 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
3 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801, Bochum, Germany
4 Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
5 Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India
6 College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
7 Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences, Qatar University, 2713, Doha, Qatar
* Corresponding Author: Chandrashekhar Meshram. Email:
Computers, Materials & Continua 2022, 72(1), 1373-1389. https://doi.org/10.32604/cmc.2022.024996
Received 07 November 2021; Accepted 31 December 2021; Issue published 24 February 2022
Abstract
The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.