Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

1 Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India
2 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
3 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801, Bochum, Germany
4 Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
5 Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India
6 College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
7 Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences, Qatar University, 2713, Doha, Qatar

* Corresponding Author: Chandrashekhar Meshram. Email: email

Computers, Materials & Continua 2022, 72(1), 1373-1389. https://doi.org/10.32604/cmc.2022.024996

Abstract

The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.

Keywords

Three-party authenticated key agreement; anonymity; fractional chaotic maps; Chebyshev polynomial; password table; human-centered internet of things (HC-IoT)

Cite This Article

APA Style
Meshram, C., Imoize, A.L., Jamal, S.S., Tambare, P., Alharbi, A.R. et al. (2022). An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures. Computers, Materials & Continua, 72(1), 1373–1389. https://doi.org/10.32604/cmc.2022.024996
Vancouver Style
Meshram C, Imoize AL, Jamal SS, Tambare P, Alharbi AR, Hussain I. An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures. Comput Mater Contin. 2022;72(1):1373–1389. https://doi.org/10.32604/cmc.2022.024996
IEEE Style
C. Meshram, A. L. Imoize, S. S. Jamal, P. Tambare, A. R. Alharbi, and I. Hussain, “An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures,” Comput. Mater. Contin., vol. 72, no. 1, pp. 1373–1389, 2022. https://doi.org/10.32604/cmc.2022.024996



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1608

    View

  • 921

    Download

  • 0

    Like

Share Link