Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

被引:6
作者
Wu, Tsu-Yang [1 ]
Kong, Fangfang [1 ]
Meng, Qian [1 ]
Kumari, Saru [2 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
IoT; Cloud computing; Authentication; Cryptanalysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; EFFICIENT; INTERNET; NETWORKS; POWER;
D O I
10.1186/s13638-023-02245-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users' access to information at any time, and provides users with corresponding cloud computing services on time. Because the information transmitted through public channels is easily intercepted, tampered with, and eavesdropped on by malicious attackers. As a result, users' and servers' private information are disclosed. Numerous scholars have proposed different authentication protocols in this environment to protect the communications between users and servers. Amin et al. devised a smart card based authentication protocol. Unfortunately, Kang et al. demonstrated that their protocol was insecure. Huang et al. discovered Kang et al.'s improvement also has security flaws and then designed a protocol to enhance security. In this paper, we first show that Huang et al.'s protocol cannot resist privileged insider and temporary value disclosure attacks. Afterward, we propose an enhanced protocol based on their protocol. Finally, we use formal/informal security analysis to demonstrate the security of the improved protocol. The comparison results are indicated that our protocol has lower computational and communication costs under the same security level.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Kaur, Damandeep
    Saini, Khushil Kumar
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39367 - 39385
  • [22] A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions
    Khalil, Usman
    Mueen-Uddin
    Malik, Owais Ahmed
    Hussain, Saddam
    IEEE ACCESS, 2022, 10 : 76805 - 76823
  • [23] Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
    Anusha Vangala
    Ashok Kumar Das
    Vinay Chamola
    Valery Korotaev
    Joel J. P. C. Rodrigues
    Cluster Computing, 2023, 26 : 879 - 902
  • [24] Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing
    Hewa, Tharaka
    Braeken, An
    Liyanage, Madhusanka
    Ylianttila, Mika
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) : 7174 - 7185
  • [25] A computation offloading method over big data for IoT-enabled cloud-edge computing
    Xu, Xiaolong
    Liu, Qingxiang
    Luo, Yun
    Peng, Kai
    Zhang, Xuyun
    Meng, Shunmei
    Qi, Lianyong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 522 - 533
  • [26] Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Yahya, Khalid
    Kumar, Neeraj
    Alazab, Mamoun
    Bin Zikria, Yousaf
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [27] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Al-saggaf, Alawi A.
    Sheltami, Tarek
    Alkhzaimi, Hoda
    Ahmed, Gamil
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2347 - 2357
  • [28] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Alawi A. Al-saggaf
    Tarek Sheltami
    Hoda Alkhzaimi
    Gamil Ahmed
    Arabian Journal for Science and Engineering, 2023, 48 : 2347 - 2357
  • [29] PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1156 - 1177
  • [30] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11) : 12191 - 12218