Open Access
ARTICLE
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7
1 Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India
2 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
3 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801, Bochum, Germany
4 Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
5 Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India
6 College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
7 Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences, Qatar University, 2713, Doha, Qatar
* Corresponding Author: Chandrashekhar Meshram. Email:
Computers, Materials & Continua 2022, 72(1), 1373-1389. https://doi.org/10.32604/cmc.2022.024996
Received 07 November 2021; Accepted 31 December 2021; Issue published 24 February 2022
Abstract
The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.
Keywords
Cite This Article
C. Meshram, A. Lucky Imoize, S. Shaukat Jamal, P. Tambare, A. R. Alharbi
et al., "An efficient three-factor authenticated key agreement technique using fcm under hc-iot architectures,"
Computers, Materials & Continua, vol. 72, no.1, pp. 1373–1389, 2022.