{"title":"ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT\u0000Based on U-Quark Hash Function","authors":"J. Jebrane, S. Lazaar","doi":"10.2174/0126662558274597231204114801","DOIUrl":"https://doi.org/10.2174/0126662558274597231204114801","url":null,"abstract":"\u0000\u0000In the last decades, the development of Internet activities has been\u0000significantly accelerated, particularly with the emergence of the Internet of Things (IoT). Heterogeneous devices in the IoT can seamlessly and feasibly inter-connect with each other without human interaction. Due to this revolution, many applications have been adopted in the arena of smart healthcare, e-commerce, environmental and habitat monitoring, etc. In order to\u0000promote and facilitate people's standards of living around the world. However, these unbounded applications bring more challenges to the storage capabilities of devices, and their security\u0000and privacy preservation. Moreover, security issues suffer from weak authentication protocols.\u0000\u0000\u0000\u0000To address these issues, suitable and secure lightweight mutual authentication\u0000schemes based on Elliptic Curve Cryptography (ECC) are required for the approval of Identity\u0000Management (IDM) of devices in the IoT. In this paper, we will propose an improved mutual\u0000authentication scheme based on ECC, coupled with a relevant seminal work considered as a\u0000reference in the field. This scheme is combined with U-Quark, a lightweight hash function, to\u0000guarantee the security needed in the IoT environment.\u0000\u0000\u0000\u0000We will compare our amended protocol with a seminal scheme as an established reference in terms of computation cost, storage cost, and executing CPU time to demonstrate that\u0000our version can ensure the most favorable performance during the authentication process.\u0000\u0000\u0000\u0000Finally, our proposed mutual authentication scheme has demonstrated its effectiveness in enhancing the security of IoT devices when compared to the seminal work in the\u0000same computational environment.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"10 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139009219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}