Computers, Materials & Continua DOI:10.32604/cmc.2022.024996 | |
Article |
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
1Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India
2Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
3Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801, Bochum, Germany
4Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
5Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India
6College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
7Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences, Qatar University, 2713, Doha, Qatar
*Corresponding Author: Chandrashekhar Meshram. Email: cs_meshram@rediffmail.com
Received: 07 November 2021; Accepted: 31 December 2021
Abstract: The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table. The projected security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Test results show that our new technique is resistant to password guessing attacks since it does not use a password. Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm. Finally, our new technique offers better security features than the techniques currently available in the literature.
Keywords: Three-party authenticated key agreement; anonymity; fractional chaotic maps; Chebyshev polynomial; password table; human-centered internet of things (HC-IoT)
Security and privacy issues are fast proliferating the Human-Centered Internet of Things (HC-IoT) space [1]. As billions of user data are being collected and transmitted by IoT devices via open channels, the vulnerability of user data to adversarial attacks needs to be considered and addressed appropriately. Unauthorized users can gain real-time access to the HC-IoT devices unlawfully. Consequently, sensitive user data is compromised, leading to a catastrophic disruption of safety-critical processes under HC-IoT architectures. Therefore, the need for secure authenticated key agreement protocols to mitigate the vast security and privacy issues in HC-IoT systems cannot be overemphasized.
Several user authentications and key agreement techniques have been reported for HC-IoT systems [2]. Generally, the HC-IoT devices are resource-limited [3]. Therefore, applying complex cryptographic primitives to these devices is quite challenging due to their resource constraints. Some authors have proposed Elliptic Curve Cryptography (ECC) to guarantee secure session keys between legitimate users in IoT environments [4–6]. However, HC-IoT devices cannot support ECC operations due to limited storage and computational resources. In order to address this problem, lightweight authentication and key agreement schemes have been proposed [5,7,8]. It is worth mentioning that most of these schemes are specially designed to reduce the computational and communication costs inherent in the ECC schemes.
Authentication schemes can support fast computational processing of user information and low communication costs. However, most of these security schemes are susceptible to various attacks and cannot provide critical security requirements [8,9]. Thus, the problem of improving the authentication efficiency and simultaneously guaranteeing the security and privacy of the scheme remains. In order to solve this problem, our work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architectures without a password table.
In recent years, several studies have reported the prevalent security and privacy issues in HC-IoT architectures. Generally, these architectures communicate over public channels, which are vulnerable to several attacks inside and outside the networks. In particular, sensitive user information can be compromised when a malicious user unlawfully intercepts or accesses the HC-IoT devices [9]. Thus, it is imperative to adequately secure user authentication schemes to mitigate unscrupulous access to critical user data. In this case, the identities of all network users would require validation in real-time and access is denied to unauthorized users. In related works, a one-way cryptographic algorithm, a hash function, has been used to map input of any size to an individual output of a fixed length of bits. This helps to provide data integrity and guarantee security against unauthorized access.
In the preliminary schemes, only one HC-IoT device can be accessed by a particular user at a time. Thus, repeated user identity validation is required to access multiple sensing HC-IoT devices. However, this approach is time-consuming and cost-prohibitive to implement in practice. Therefore, the need for a three-factor authenticated key agreement technique using fractional chaotic maps to access several sensing devices in real-time without a password table and establish the shared session key among the network users is not out of place.
This work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under HC-IoT architectures. The following is a list of the paper's contributions.
▪ We present a secret sharing technique for constructing a secure three-factor authenticated key agreement without a password table. The presented technique utilized a hash function, which works well for the resource-limited HC-IoT devices.
▪ We establish the formal security proof of the presented technique using Burrows–Abadi–Needham (BAN) logic under random oracle. Specifically, our scheme differentiates a real adversary from a simulation.
▪ The three-factor authenticated key agreement technique designed using fractional chaotic maps supports the architecture's dynamic sensing of HC-IoT devices without a password table.
▪ Finally, we present a security investigation and performance comparison of the presented technique and demonstrate that it reduces the communication and computational overhead drastically compared to existing related techniques.
The rest of this paper is laid out as follows. In Section 2, we present the related works. Section 3 gives the preliminaries covering fractional chaotic maps and their cryptographic properties. Section 4 focuses on the proposed technique under HC-IoT architectures. Section 5 deals with the formal authentication proof of the scheme using BAN logic. Section 6 presents the security investigation of the technique and valuable discussions. Section 7 covers the performance comparison of the presented technique to demonstrate its superiority over the existing schemes. Section 8 wraps up the paper with a concise conclusion.
Distributed private cloud servers store critical user information harvested from HC-IoT devices to allow access to legitimate users. Several authentication protocols with a key agreement for use under HC-IoT architectures have been proposed [10–12]. In particular, a lightweight authentication scheme for application in Wireless Sensors Networks (WSNs) was proposed by Das [10]. The scheme allows users to validate their identities by entering their secret passwords and smart cards. However, the scheme uses only the hash function, limiting its security.
Additionally, some flaws have been identified in Das’ scheme. These include the inability to resist denial-of-service attacks and node compromised attacks [11]. In order to address these limitations in Das’ scheme, an authentication scheme utilizing biohacking has been proposed by [11]. The scheme gives a lower error rate compared to existing traditional techniques. However, Wang et al. [12] estimated several two-factor authentication techniques. They observed that the technique by Srinivas et al. [11] is susceptible to offline guessing attacks and cannot guarantee user anonymity in real-time.
In related work, Esfahani et al. [13] anticipated an efficient authentication technique using the hash function and exclusive OR (XOR) operation. The technique was tailored for application in the Industrial Internet of Things (IIoT). The technique achieves low communication and computational costs and satisfies several security requirements. In another related work, Wazid et al. [14] presented a user authentication and key management technique that uses passwords, biometrics and a smart card for identity validation. Hossain et al. [15] proposed a cloud-assisted scheme that gives real-time patient data for healthcare applications. In work due to Li et al. [4], elliptic curve cryptography (ECC)-empowered authentication protocol was proposed. The scheme seeks to tackle the security flaws in existing schemes and enhance IIoT wireless networks’ privacy.
In another study, Li et al. [16] put forward a three-factor authentication technique for IIoT systems. The work aims at enhancing the security of the scheme to withstand sophisticated attacks and provide user anonymity. On integrating IoT with cloud computing to support IoT services, Yu et al. [17] demonstrated the possibility of achieving improved user services, leveraging IoT. However, several attacks that limit the security of cloud-based servers have been identified [18, 19]. Furthermore, the work [19] proposes a better authentication scheme, which applies to Internet of Things (IoT)-assisted cloud computing architectures to resist DoS and privileged insider attacks.
In [20], chaotic maps enabled authentication scheme was proposed for ID-based digital signatures. The security of the scheme was tested on the suppositions of complex Diffie-Hellman problems and discrete logarithm. Also, Gao et al. [21] put forward an authentication technique leveraging chaotic maps for the wireless body area networks. The technique facilitated the securely monitoring and recording of patients’ health data. Performance analysis of the technique guarantees user confidentiality, and it reduces the cost of multiplication and exponentiation during computation at a low communication cost.
In a similar vein, an anonymity preserving authentication technique was proposed in [22]. Security verification of the technique was done using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Test results showed enhanced performances compared to other related techniques in the literature. In several works due to Meshram et al. [3,9,23], efficient and provably secure authentication techniques using extended chaotic maps were proposed. The schemes show robust security features covering low computational and communication costs.
In comparison with preceding techniques, the three-factor authenticated key agreement technique projected in this paper is unique in several aspects. The launched security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures. Finally, the technique uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the architecture without a password table.
Before going into the current inquiry on the presented three-factor authenticated key agreement technique, this part discusses the many fundamental principles pertaining to the work. First, a Chebyshev chaotic map implementation with a short existence is described. Following that, a Chebyshev polynomial, fractional chaotic maps utilizing the minimum approach, and a list of other techniques employed in this development are represented. The notations used in our method are briefly defined in Tab. 1.
Two fundamental prerequisites in the evolution of cryptographic systems are ambiguity and dispersion. Chaotic frameworks are suitable for achieving diffusion and uncertainty assets in cryptography because of their sensitivity to primary conditions, ergodicity, and pseudo-randomness. As a result, chaotic maps have been used to create several symmetric and asymmetric key cryptosystems [24–26]:
Definition 1. (Chaotic map). In the variation
The Chebyshev polynomial's recurrence relation is defined as
In this scenario, the functional
3.1.1 Properties of Chaotic Maps
Chebyshev polynomials have the following two essential properties:
Chaotic properties: The CP transform
Semi-group properties: The semigroup property of
Public-key cryptography based on the Chebyshev polynomial map semigroup property is unstable, according to Bergamo et al. [25]. Zhang [26] proved, however, that the semigroup property retains an interval
where
By using the propositions [27–31], various computational challenges based on Chebyshev polynomials are explained in this segment.
Definition 2. (Chaotic Map-based Discrete Logarithm Problem (CMDLP)). Any polynomial time-bounded technique that discovers the number
Definition 3. (Chaotic Map-based Diffie-Hellman problem (CMDHP)). Any polynomial time-bounded procedure that attempts to find the estimate
3.2 Fractal Chaotic Maps (FCM)
Historically, the Fractal Calculus (FC) was called a local fractional calculus [32,33]. However, fractional calculus accepts possessions (derivatives of non-integer power). FC takes precedence over the related preparation:
Assume that the formal expression for a random fractional-order
and the fractal integral operator is the same as this.
It can be approximated using the formula in (1)
We get the following formulation (2) by generalising the polynomial
The FCP stands for the fractal Chebyshev polynomial (see Fig. 1).
3.2.1 Properties of Fractal Chaotic Maps
Two of the FCP's soothing properties are as follows:
Definition 4 (Chaotic possessions of FCM). The fractal Chaotic maps [33,34] satisfy the recurrent relations under the chaotic possessions, i.e.,
Definition 5 (Semi-group possessions of FCM). The semi-group possessions hold, i.e., for FCMs on the interval (−∞, ∞) [33].
4 The Proposed Technique Under the HC-IoT Architecture
This section will show you the steps of our new three-party authenticated key agreement technique. Fig. 2 depicts the layout of our strategy. Please note that the term
5 The Formal Authentication Proof Using BAN Logic
The BAN logic is a well-known method of ensuring that information exchange protocols are valid. In this section, we will examine the accuracy of the session key among
The notations and syntax of the BAN logic are defined here. The specific participants are defined as
1.
2.
3.
4.
5.
6.
7.
8.
9.
In our system, there are three roles:
In the language of BAN logic, our strategy aims to achieve four objectives:
G1.
G2.
G3.
G4.
Because
The assumptions must be presented once the goals have been established:
We will use the BAN logic to check the accuracy of our suggested framework in this part. The main steps in the evidence are as follows:
Message 1:
Message 2:
Message 3:
Message 4:
Message 5:
6 Security Analysis and Discussions
This section provides a check to confirm that the presented technique supports mutual authentication, perfect forward secrecy, and user anonymity. Additionally, we put the suggested technique to the test against several attacks, including the man-in-the-middle attack, privileged insider attack, known-key secrecy, perfect forward secrecy, password guessing attacks, Clock synchronization problem, and the user identity forgery.
Hypothesis 1: The proposed technique can successfully resist the man-in-the-middle attack.
Justification: The attacker cannot manufacture a valid message using the suggested technique since the attacker does not have access to the secret values
Hypothesis 2: The proposed technique can offer mutual authentication among the users
Justification: Mutual authentication is a critical aspect of user authentication techniques since it allows any scheme member to authenticate the others. By computing secret keys
Hypothesis 3: The proposed technique protects the user's anonymity.
Justification: When the two users create their shared session key, they must inform each other and the server
Hypothesis 4: The proposed technique protects against user identity forgery.
Justification: The identities of the two users are included in the message sent to server
Hypothesis 5: The proposed technique need not require a password table.
Justification: A password table must exist on the server-side for a password authentication technique to effectively save and update the legal participants’ passwords. An insider attack could occur if the server has malicious intentions, and passwords could be exploited or manipulated. There is no password table on the server-side of our technique because we do not maintain the participants’ passwords. Hence there is no possibility of an insider attack.
Hypothesis 6: The proposed technique is secured against password guessing attacks.
Justification: A password authentication mechanism will always be vulnerable to a password guessing attack. After intercepting a transmission, the attacker will guess the proper password. If the password is accurately guessed, the attacker can use it to commit fraud. Unlike password authentication techniques, our technique does not rely on passwords, it is immune to password guessing attacks.
Hypothesis 7: The proposed technique is secured against the Clock synchronization problem.
Justification: Unlike many previous key agreement techniques, the proposed key agreement technique could continue to work even if the clock is out of sync, ensuring secure communication between sender and receiver. Because the timestamp is merely relative to the receiver's clock, synchronized clocks are unnecessary. The timestamp generated by the receiver is the only one he verifies.
Hypothesis 8: The proposed technique can offer known-key secrecy.
Justification: Even if the sender intercepts the prior session keys, our presented technique can offer known-key secrecy because the next session keys cannot be exposed. If a sender intercepts a session key
Hypothesis 9: The proposed technique can offer perfect forward secrecy.
Justification: Creating a session key among communication entities is independent of previously generated session keys. Our presented technique can ensure perfect forward secrecy. Even though the sender can intercept the parameters
We demonstrate the efficiency of the presented technique in this portion of the article. Tab. 3 compares the security features of our suggested technique to those of Lee et al. [37], Zhao et al. [38], Farash et al. [39], Xie et al. [40], and Jabbari et al. [41] techniques. Under key considerations, our proposed technique provides higher security than the other techniques. In addition, we compared the computational primitives employed in our proposed technique's positioning of the users and server to those used in other relevant techniques.
In this contrast study, we employed the four-time complexity notations listed below.:
On the other hand, our proposed technique can provide comprehensive security assurance at a cheap computing cost while displaying very high-efficiency thanks to Chebyshev chaotic maps and hash functions.
This paper proposed an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architecture without a password table. Our novel technique is entirely immune to password guessing attacks. Furthermore, our technique ensures that users’ privacy is fully protected, ensuring that a user forging attack has no adverse consequences. Our novel strategy outperforms the currently available technique in terms of security. Also, we performed a BAN logic test and confirmed the correctness of our technique. However, the current paper has not deployed the experimental setting for the proposed scheme. In future work, we would focus on a lightweight three-factor authentication and key agreement technique for IoT multi-gateway wireless sensor networks leveraging extended Chebyshev chaotic maps.
Acknowledgement: The authors extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research group program under grant number R. G. P. 1/72/42. The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD) through the Nigerian–German Postgraduate Program under grant 57473408.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. J. Singh, A. Gimekar and S. Venkatesan, “An efficient lightweight authentication scheme for human-centered industrial internet of things,” International Journal of Communication Systems, no. e4189, pp. 1–13, 2019. [Google Scholar]
2. M. Saqib, B. Jasra and A. H. Moon, “A lightweight three factor authentication framework for IoT based critical applications,” Journal of King Saud University-Computer and Information Sciences, pp. 1–13, 2021. [Google Scholar]
3. C. Meshram, A. Alsanad, J. V. Tembhurne, S. W. Shende, K. W. Kalare et al., “A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT,” IEEE Access, vol. 9, pp. 3649–3659, 2021. [Google Scholar]
4. X. Li, J. Niu, M. Z. A. Bhuiyan, F. Wu, M. Karuppiah et al., “A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3599–3609, 2018. [Google Scholar]
5. J. Shen, S. Chang, J. Shen, Q. Liu and X. Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,” Future Generation Computer Systems, vol. 78, pp. 956–963, 2018. [Google Scholar]
6. A. K. Das, M. Wazid, A. R. Yannam, J. J. P. C. Rodrigues and Y. Park, “Provably secure ECC-based device access control and key agreement protocol for IoT environment,” IEEE Access, vol. 7, pp. 55382–55397, 2019. [Google Scholar]
7. B. Ying and A. Nayak, “Anonymous and lightweight authentication for secure vehicular networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 12, pp. 10626–10636, 2017. [Google Scholar]
8. M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos and J. J. P. C. Rodrigues, “Design and analysis of secure lightweight remote user authentication and Key agreement scheme in internet of drones deployment,” IEEE Internet Things Journal, vol. 6, no. 2, pp. 3572–3584, 2019. [Google Scholar]
9. C. Meshram, M. S. Obaidat, J. V. Tembhurne, S. W. Shende, K. W. Kalare et al., “A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems,” IEEE Systems Journal, vol. 15, no. 4, pp. 5507–5515, 2021. [Google Scholar]
10. M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086–1090, 2009. [Google Scholar]
11. J. Srinivas, S. Mukhopadhyay and D. Mishra, “Secure and efficient user authentication scheme for multi-gateway wireless sensor networks,” Ad Hoc Networks, vol. 54, pp. 147–169, 2017. [Google Scholar]
12. D. Wang, W. Li and P. Wang, “Measuring Two-factor authentication schemes for real-time data access in industrial wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 14, no. 9, pp. 4081–4092, 2018. [Google Scholar]
13. A. Esfahani, G. Mantas, R. Matischek, F. B. Saghezchi, J. Rodriguez et al., “A lightweight authentication mechanism for M2M communications in industrial IoT environment,” IEEE Internet Things Journal, vol. 6, no. 1, pp. 288–296, 2019. [Google Scholar]
14. M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti et al., “Design of secure user authenticated Key management protocol for generic IoT networks,” IEEE Internet Things Journal, vol. 5, no. 1, pp. 269–282, 2018. [Google Scholar]
15. M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (IIoT) – enabled framework for health monitoring,” Computer Networks, vol. 101, pp. 192–202, 2016. [Google Scholar]
16. X. Li, J. Peng, J. Niu, F. Wu, J. Liao et al., “A robust and energy efficient authentication protocol for industrial internet of things,” IEEE Internet Things Journal, vol. 5, no. 3, pp. 1606–1615, 2018. [Google Scholar]
17. Y. Yu, L. Hu and J. Chu, “A secure authentication and Key agreement scheme for IoT-based cloud computing environment,” Symmetry, vol. 12, no. 1, 150, pp. 1–16, 2020. [Google Scholar]
18. H. Lee, D. Kang, Y. Lee and D. Won, “Secure three-factor anonymous user authentication scheme for cloud computing environment,” Wireless Communication and Mobile Computing, vol. 2021, pp. 2098530, 2021. [Google Scholar]
19. A. S. Almogren, “Intrusion detection in edge-of-things computing,” Journal of Parallel and Distributed Computing, vol. 137, pp. 259–265, 2020. [Google Scholar]
20. S. K. H. Islam, “Design of identity-based digital signature schemes using extended chaotic maps,” IACR Cryptology ePrint Archive, vol. 2014, pp. 275–280, 2014. [Google Scholar]
21. G. Gao, X. Peng, Y. Tian and Z. Qin, “A chaotic maps-based authentication scheme for wireless body area networks,” International Journal of Distributed Sensor Networks, vol. 12, no. 7, pp. 2174720, 2016. [Google Scholar]
22. Y. Lu, L. Li, H. Zhang and Y. Yang, “An extended chaotic maps-based three-party password- authenticated key agreement with user anonymity,” PLoS One, vol. 11, no. 4, pp. 1–19, 2016. [Google Scholar]
23. C. Meshram, C.-C. Lee, S. G. Meshram and C.-T. Li, “An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem,” Soft Computing, vol. 23, no. 16, pp. 6937–6946, 2019. [Google Scholar]
24. L. Kocarev, “Chaos-based cryptography: A brief overview,” IEEE Circuits Systems Magazine, vol. 1, no. 3, pp. 6–21, 2001. [Google Scholar]
25. P. Bergamo, P. Arco, A. Santis and L. Kocarev, “Security of public key cryptosystems based on chebyshev polynomials,” IEEE Transactions on Circuits and Systems, vol. 52, no. 7, pp. 1382–1393, 2005. [Google Scholar]
26. L. Zhang, “Cryptanalysis of the public key encryption based on multiple chaotic systems,”, Chaos Solitons & Fractals, vol. 37, no. 3, pp. 669–674, 2008. [Google Scholar]
27. C. Meshram, C. C. Lee, S. G. Meshram, C. T. Li, “An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem,” Soft Computing, vol. 23, no. 16, pp. 6937–6946, 2019. [Google Scholar]
28. C. Meshram, C. C. Lee, A. S. Ranadive, C. T. Li, S. G. Meshram et al., “A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing,” International Journal of Communication Systems, vol. 33, no. 7, p. e4307, 2020. [Google Scholar]
29. C. Meshram, C. C. Lee, S. G. Meshram and A. Meshram, “OOS-SSS: An efficient online/offline subtree-based short signature scheme using chebyshev chaotic maps for wireless sensor network,” IEEE Access, vol. 8, no. 1, pp. 80063–80073, 2020. [Google Scholar]
30. C. Meshram, R. W. Ibrahim, L. Deng, S. W. Shende, S. G. Meshram et al., “A robust smart card and remote user password-based authentication protocol using extended chaotic-maps under smart cities environment,” Soft Computing, vol. 25, no. 15, pp. 10037–10051, 2021. [Google Scholar]
31. C. Meshram, M. S. Obaidat, J. V. Tembhurne, S. W. Shende, K. W. Kalare et al., “A lightweight provably secure digital short signature technique using extended chaotic maps for human-centered IoT systems,” IEEE Systems Journal, vol. 15, no. 4, pp. 5507–5515, 2021. [Google Scholar]
32. X. J. Yang, D. Baleanu and H. M. Srivastava, “Local fractional integral transforms and their applications,” Elsevier/Academic Press, cop., 2016. [Google Scholar]
33. C. Meshram, R. W. Ibrahim, A. J. Obaid, S. G. Meshram, A. Meshram et al., “Fractional chaotic maps based short signature scheme under human-centredIoT environments,” Journal of Advanced Research, vol. 32, pp. 139–148, 2020. [Google Scholar]
34. S. Han and E. Chang, “Chaotic map based key agreement with/out clock synchronization,” Choas, Solitons and Fractals, vol. 39, no. 3, pp. 1283–1289, 2009. [Google Scholar]
35. M. Burrows, M. Abadi and R. Needham, “A logic of authentication,” ACM Transactions Computer Systems, vol. 8, no. 1, pp. 18–36, 1990. [Google Scholar]
36. M. S. Farash and M. A. Attari, “An improved password-based authentication scheme for session initiation protocol using smart cards without verification table,” International Journal of Communication Systems, vol. 30, no. 1, pp. e2879, 2017. [Google Scholar]
37. C. -C. Lee, C. -T. Li, S. -T. Chiu and Y. -M. Lai, “A new three party-authenticated key agreement scheme based on chaotic maps without password table,” Nonlinear Dynamics, vol. 79, no. 4, pp. 2485–2495, 2015. [Google Scholar]
38. F. Zhao, P. Gong, S. Li, M. Li and P. Li, “Cryptanalysis and improvement of a three-party key agreement protocol using enhanced chebyshev polynomials,” Nonlinear Dynamics, vol. 74, no. 12, pp. 419–427, 2013. [Google Scholar]
39. M. S. Farash and M. A. Attari, “An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps,” Nonlinear Dynamics, vol. 77, no. 12, pp. 399–411, 2014. [Google Scholar]
40. Q. Xie, J. Zhao and X. Yu, “Chaotic maps-based three-party password-authenticated key agreement scheme,” Nonlinear Dynamics, vol. 74, no. 4, pp. 1021–1027, 2013. [Google Scholar]
41. A. Jabbari and J. B Mohasefi,. “Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table,” Nonlinear Dynamics, vol. 95, pp. 3177–3191, 2019. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |