A Secure Authenticated Key Agreement Scheme for Post-cloud computing–based IoT networks


Date Published : 26 December 2025

Contributors

Upendra Verma

Post-Doc Researcher, Department of CSE, Lincoln University College, Malaysia
Author

Divya Midhunchakkaravarthy

Director, Centre of Postgraduate Studies, Lincoln University College, Malaysia
Author

Pawan Kumar Chaurasia

Associate Professor, Babasaheb Bhimrao Ambedkar University, A Central University, Lucknow, India
Author

Keywords

IoT networks Security and Privacy Authentication AVISPA Computational complexity

Proceeding

Track

Engineering, Sciences, Mathematics & Computations

License

Copyright (c) 2025 Sustainable Global Societies Initiative

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Abstract

In the past few years, the post-cloud computing model has become one of the most noteworthy technological development because of its competence to process an extensive range of response-intensive internet of things (IoT) applications. The IoT devices have limited computational resources in response-intensive IoT networks. Therefore, security and privacy are critical concerns, and authentication plays a vital role in post-cloud computing–based IoT networks. In this paper, we propose ECC-based authenticated key agreement approach to address authentication challenges in post-cloud computing–based IoT networks. The Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation program under the Dolev-Yao (DY) attack model is used to formally verify the security of the proposed approach. The proposed scheme is compared with existing authentication schemes in terms of computational complexity, and the results confirm its effectiveness for post-cloud computing–based IoT networks. Finally, comparative analysis of security features confirms that the proposed scheme outperforms existing schemes.

References

No References

Downloads

How to Cite

Upendra Verma, U. V., Divya Midhunchakkaravarthy, D. M., & Pawan Kumar Chaurasia , P. K. C. . (2025). A Secure Authenticated Key Agreement Scheme for Post-cloud computing–based IoT networks. Sustainable Global Societies Initiative, 1(1). https://vectmag.com/sgsi/paper/view/65