A Secure Authenticated Key Agreement Scheme for Post-cloud computing–based IoT networks
Contributors
Upendra Verma
Divya Midhunchakkaravarthy
Pawan Kumar Chaurasia
Keywords
Proceeding
Track
Engineering, Sciences, Mathematics & Computations
License
Copyright (c) 2025 Sustainable Global Societies Initiative

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
In the past few years, the post-cloud computing model has become one of the most noteworthy technological development because of its competence to process an extensive range of response-intensive internet of things (IoT) applications. The IoT devices have limited computational resources in response-intensive IoT networks. Therefore, security and privacy are critical concerns, and authentication plays a vital role in post-cloud computing–based IoT networks. In this paper, we propose ECC-based authenticated key agreement approach to address authentication challenges in post-cloud computing–based IoT networks. The Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation program under the Dolev-Yao (DY) attack model is used to formally verify the security of the proposed approach. The proposed scheme is compared with existing authentication schemes in terms of computational complexity, and the results confirm its effectiveness for post-cloud computing–based IoT networks. Finally, comparative analysis of security features confirms that the proposed scheme outperforms existing schemes.