{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:53:14Z","timestamp":1740149594172,"version":"3.37.3"},"reference-count":41,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072416"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Research and Development Special Project of Henan Province","award":["221111210500"]},{"name":"Science and Technology Program of Henan Province","award":["212102210107","232102210125"]},{"name":"Doctor Scientific Research Fund of Zhengzhou University of Light Industry","award":["2021BSJJ033"]},{"name":"Foundation of State Key Laboratory of Public Big Data","award":["PBD2023-25"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications. Without the PKI certificate and high time-complexity bilinear pairing operations, identity-based AKA (ID-AKA) protocols without pairings are more suitable for protecting the keys in IoT applications. In recent years, many pairing-free ID-AKA protocols have been proposed. Moreover, these protocols have some security flaws or relatively extensive computation and communication efficiency. Focusing on these problems, the security analyses of some recently proposed protocols have been provided first. We then proposed a family of eCK secure ID-AKA protocols without pairings to solve these security problems, which can be applied in IoT applications to guarantee communication security. Meanwhile, the security proofs of these proposed ID-AKA protocols are provided, which show they can hold provable eCK security. Some more efficient instantiations have been provided, which show the efficient performance of these proposed ID-AKA protocols. Moreover, comparisons with similar schemes have shown that these protocols have the least computation and communication efficiency at the same time.<\/jats:p>","DOI":"10.3390\/s24010061","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T06:19:42Z","timestamp":1703225982000},"page":"61","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications"],"prefix":"10.3390","volume":"24","author":[{"given":"Haiyan","family":"Sun","sequence":"first","affiliation":[{"name":"College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-2714","authenticated-orcid":false,"given":"Chaoyang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]},{"given":"Shujun","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]},{"given":"Wanwei","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Din, I.U., Majali, T.E., and Kim, B.S. (2022). A survey of authentication in Internet of things-enabled healthcare systems. Sensors, 22.","DOI":"10.3390\/s22239089"},{"key":"ref_2","first-page":"9677","article-title":"High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem","volume":"34","author":"Jayabalasamy","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"71194","DOI":"10.1109\/ACCESS.2018.2875681","article-title":"Design and implementation of an SM2-based security authentication scheme with the key agreement for smart grid communications","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"13544","DOI":"10.1109\/JIOT.2023.3262660","article-title":"User-friendly public-key authenticated encryption with keyword search for industrial Internet of things","volume":"10","author":"Pu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","article-title":"A survey on attribute-based encryption schemes suitable for the Internet of things","volume":"9","author":"Rasori","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Onyema, E.M., Kumar, M.A., Balasubaramanian, S., Bharany, S., Rehman, A.U., Eldin, E.T., and Shafiq, M. (2022). A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks. Sustainability, 14.","DOI":"10.3390\/su141911950"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alam, S., Shuaib, M., Ahmad, S., Jayakody, D.N.K., Muthanna, A., Bharany, S., and Elgendy, I.A. (2022). Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration. Sustainability, 14.","DOI":"10.3390\/su142215312"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1109\/TIFS.2022.3173536","article-title":"A fully authenticated Diffie-Hellman protocol and its application in WSNs","volume":"17","author":"Sun","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","unstructured":"Shamir, A. (1985). Advances in Cryptology: Proceedings of CRYPTO 84 4, Springer."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1049\/el:20020387","article-title":"Identity-based authenticated key agreement protocol based on Weil pairing","volume":"38","author":"Smart","year":"2002","journal-title":"Electron. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.ins.2008.09.020","article-title":"An improved identity-based key agreement protocol and its security proof","volume":"179","author":"Wang","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","article-title":"Identity-based key agreement protocols from pairings","volume":"6","author":"Chen","year":"2007","journal-title":"Int. J. Inf. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Huang, H., and Cao, Z. (2009, January 10\u201312). An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia.","DOI":"10.1145\/1533057.1533101"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.ins.2014.05.041","article-title":"A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols","volume":"281","author":"Choo","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_15","first-page":"112","article-title":"An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network","volume":"37","author":"Wu","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_16","first-page":"1900","article-title":"Provably secure authenticated key agreement scheme for smart grid","volume":"9","author":"Odelu","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/JSYST.2020.3004551","article-title":"A provably secure and lightweight identity-based two-party authenticated key agreement protocol for IIoT environments","volume":"15","author":"Gupta","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_18","unstructured":"Lian, H., Pan, T., Wang, H., and Zhao, Y. (2021). Computer Security-ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4\u20138 October 2021, Springer International Publishing. Proceedings, Part II 26."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Canetti, R., and Krawczyk, H. (2001, January 6\u201310). Analysis of key-exchange protocols and their use for building secure channels. Proceedings of the International conference on the theory and applications of cryptographic techniques, Innsbruck, Austria.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"LaMacchia, B., Lauter, K., and Mityagin, A. (2007, January 1\u20132). Stronger security of authenticated key exchange. Proceedings of the International Conference on Provable Security, Wollongong, Australia.","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11277-015-2626-5","article-title":"PF-ID-2PAKA: Pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks","volume":"87","author":"Bala","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","article-title":"A novel identity-based key establishment method for advanced metering infrastructure in smart grid","volume":"9","author":"Mohammadali","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1109\/JIOT.2018.2864219","article-title":"Unbalancing pairing-free identity-based authenticated key exchange protocols for disaster scenarios","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","article-title":"A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges","volume":"180","author":"Cao","year":"2010","journal-title":"Inf. Sci."},{"key":"ref_25","unstructured":"Fiore, D., and Gennaro, R. (2010). Topics in Cryptology-CT-RSA 2010: The Cryptographers\u2019 Track at the RSA Conference 2010, San Francisco, CA, USA, 1\u20135 March 2010, Springer."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.ipl.2012.05.001","article-title":"One-round identity-based key exchange with perfect forward security","volume":"112","author":"Xie","year":"2012","journal-title":"Inf. Process. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ins.2016.05.015","article-title":"Strongly secure identity-based authenticated key agreement protocols without bilinear pairings","volume":"367","author":"Ni","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1550147718772545","DOI":"10.1177\/1550147718772545","article-title":"Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks","volume":"14","author":"Dang","year":"2018","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2236","DOI":"10.1007\/s12083-021-01181-8","article-title":"Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks","volume":"14","author":"Deng","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"104630","DOI":"10.1016\/j.ic.2020.104630","article-title":"An efficient ECK secure identity based two party authenticated key agreement scheme with security against active adversaries","volume":"275","author":"Daniel","year":"2020","journal-title":"Inf. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2779","DOI":"10.1109\/JSYST.2020.2990749","article-title":"A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network","volume":"15","author":"Kumar","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_32","unstructured":"Rakeei, M.A., and Moazami, F. (2020). Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network. Cryptol. ePrint Arch., 1\u20134."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"9918","DOI":"10.1109\/JIOT.2022.3163367","article-title":"A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment","volume":"9","author":"Pu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1002\/int.22644","article-title":"A group key agreement protocol for intelligent internet of things system","volume":"37","author":"Zhang","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.isatra.2023.04.010","article-title":"Secure and efficient authenticated group key agreement protocol for AI-based automation systems","volume":"141","author":"Zhou","year":"2023","journal-title":"ISA Trans."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"102821","DOI":"10.1016\/j.sysarc.2022.102821","article-title":"An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles","volume":"136","author":"Pan","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"9716","DOI":"10.1109\/JIOT.2023.3234178","article-title":"SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme with Perfect Forward Secrecy for Industrial Internet of Things","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"103094","DOI":"10.1016\/j.adhoc.2023.103094","article-title":"Provably secured lightweight authenticated key agreement protocol for modern health industry","volume":"141","author":"Abdussami","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"ref_39","first-page":"597","article-title":"Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols","volume":"22","author":"Cheng","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","article-title":"Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography","volume":"10","author":"He","year":"2016","journal-title":"IET Commun."},{"key":"ref_41","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S.C. (2004). Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge, MA, USA, 11\u201313 August 2004, Springer. Proceedings 6."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/1\/61\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T17:37:44Z","timestamp":1736962664000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/1\/61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["s24010061"],"URL":"https:\/\/doi.org\/10.3390\/s24010061","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,12,22]]}}}