Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

1 Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India
2 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
3 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801, Bochum, Germany
4 Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
5 Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India
6 College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
7 Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences, Qatar University, 2713, Doha, Qatar

* Corresponding Author: Chandrashekhar Meshram. Email: email

Computers, Materials & Continua 2022, 72(1), 1373-1389. https://doi.org/10.32604/cmc.2022.024996

Abstract

The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.

Keywords


Cite This Article

APA Style
Meshram, C., Imoize, A.L., Jamal, S.S., Tambare, P., Alharbi, A.R. et al. (2022). An efficient three-factor authenticated key agreement technique using FCM under hc-iot architectures. Computers, Materials & Continua, 72(1), 1373-1389. https://doi.org/10.32604/cmc.2022.024996
Vancouver Style
Meshram C, Imoize AL, Jamal SS, Tambare P, Alharbi AR, Hussain I. An efficient three-factor authenticated key agreement technique using FCM under hc-iot architectures. Comput Mater Contin. 2022;72(1):1373-1389 https://doi.org/10.32604/cmc.2022.024996
IEEE Style
C. Meshram, A.L. Imoize, S.S. Jamal, P. Tambare, A.R. Alharbi, and I. Hussain, “An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures,” Comput. Mater. Contin., vol. 72, no. 1, pp. 1373-1389, 2022. https://doi.org/10.32604/cmc.2022.024996



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1459

    View

  • 793

    Download

  • 0

    Like

Share Link