信息网络安全 ›› 2025, Vol. 25 ›› Issue (9): 1407-1417.doi: 10.3969/j.issn.1671-1122.2025.09.009

• 入选论文 • 上一篇    下一篇

面向物联网场景的动态三因素认证密钥协商协议

杨昱坤, 肖为恩, 梁博轩, 黄鑫()   

  1. 太原理工大学计算机科学与技术学院(大数据学院),太原 030024
  • 收稿日期:2025-03-25 出版日期:2025-09-10 发布日期:2025-09-18
  • 通讯作者: 黄鑫 huangxin@tyut.edu.cn
  • 作者简介:杨昱坤(2000—),男,山西,硕士研究生,主要研究方向为信息安全|肖为恩(1997—),男,山西,博士研究生,主要研究方向为信息安全|梁博轩(2004—),男,山西,本科,主要研究方向为信息安全|黄鑫(1982—),男,山西,教授,博士,主要研究方向为信息安全、区块链、物联网
  • 基金资助:
    山西省回国留学人员科研资助项目(2021-038)

Dynamic Three-Factor Authentication Key Agreement Protocol for IoT Scenarios

YANG Yukun, XIAO Weien, LIANG Boxuan, HUANG Xin()   

  1. Department of Computer Science and Technology (College of Data Science), Taiyuan University of Technology, Taiyuan 030024, China
  • Received:2025-03-25 Online:2025-09-10 Published:2025-09-18

摘要:

近年来,物联网设备的广泛应用,显著提升了人们的生活质量和工作效率。然而,物联网设备之间的数据共享通过网络进行,这使得数据容易受到网络攻击和泄露的威胁。文章旨在提高物联网设备数据交换的安全性,研究重点是多因素认证密钥协商(MFAKA)协议。文章围绕物联网设备间数据共享的安全性展开研究,采用了生物哈希技术(BioHash)和椭圆曲线密码学(ECC),并基于可证明安全中的真实或随机(ROR)模型进行理论分析,设计了一种结合了生物哈希技术和椭圆曲线密码学的新型动态三因素认证密钥协商协议D3FAKAP,确保了用户在登录过程中的匿名性和不可链接性。此外,文章所提方案在真实或随机模型下被证明具有语义安全性。性能分析表明,该方案在安全性和资源占用方面适合物联网环境。

关键词: 物联网, 多因素认证, 认证密钥协商协议, 可证明安全

Abstract:

In recent years, the widespread adoption of Internet of Things (IoT) devices has significantly enhanced both the quality of life and work efficiency. However, the data sharing between IoT devices occurs over networks, making it susceptible to attacks and breaches. This paper aims to enhance the security of data exchange among IoT devices, focusing on Multi-Factor Authentication and Key Agreement (MFAKA) protocols. The research was centered on the security of data sharing between IoT devices, utilizing BioHash technology and Elliptic Curve Cryptography (ECC), and conducting theoretical analysis based on the Real-Or-Random (ROR) model in provable security. A novel dynamic three-factor authentication and key agreement protocol, named D3FAKAP, was proposed. This protocol integrated BioHash technology and ECC to achieve genuine three-factor authentication, This ensures user anonymity and unlinkability during the login process. Additionally, the proposed scheme is proven to be semantically secure under the Real-Or-Random model. Performance analysis indicates that the proposed scheme is well-suited for IoT environments in terms of security and resource efficiency.

Key words: IoT, multi-factor authentication, authentication key agreement protocol, provable security

中图分类号: