Analyzing of LAM-CIoT: Lightweight Authentication Mechanism in Cloud-based IoT Environment

被引:0
作者
Alsahlani, Ahmed Yaser Fahad [1 ]
Popa, Alexandru [1 ]
机构
[1] Univ Bucharest, Fac Math & Comp Sci, Dept Comp Sci, Bucharest, Romania
来源
2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI) | 2020年
关键词
Security analysis; Multi-factor authentication; Internet of Things (IoT); Cloud computing; Real-time data access; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; MUTUAL AUTHENTICATION; INTERNET; THINGS; SECURITY; SYSTEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Communicating smart entities in the Internet of Things (IoT) environment using cloud technology makes human daily life more convenient and brings benefits in various fields. After the occurrence of the novel coronavirus, the demand for remotely managed systems will significantly raise up to mitigate the harmful consequences of social distancing and to increase the systems' efficiency as well. In such systems, sharing relevant information among honest entities over public connection brings numerous security risks. In this context, in 2020, Wazid et al. proposed a new lightweight authentication mechanism for cloud-based IoT environment called LAM-CIoT. Their mechanism uses multi-factor authentication and provides real-time data access from the deployed IoT-sensors. Wazid et al. argued that the mechanism they proposed is stable, efficient and scalable. However, we find out that Wazid et al.'s mechanism shows weaknesses and is incomplete. In this paper, we brielly introduce Wazid et al.'s mechanism and expound that their mechanism is still unstable and not suitable to be applied in practice.
引用
收藏
页码:1837 / 1844
页数:8
相关论文
共 26 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   Wireless sensor networks for traffic monitoring in a logistic centre [J].
Bottero, M. ;
Dalla Chiara, B. ;
Deflorio, F. P. .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2013, 26 :99-124
[3]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[4]   Secure multi-factor remote user authentication scheme for Internet of Things environments [J].
Dhillon, Parwinder Kaur ;
Kalra, Sheetal .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
[5]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[6]   Pre-Alarm System Based on Real-Time Monitoring and Numerical Simulation Using Internet of Things and Cloud Computing for Tailings Dam in Mines [J].
Dong, Longjun ;
Shu, Weiwei ;
Sun, Daoyuan ;
Li, Xibing ;
Zhang, Lingyun .
IEEE ACCESS, 2017, 5 :21080-21089
[7]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[8]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[9]   The role of smart grids in the building sector [J].
Kolokotsa, Dionysia .
ENERGY AND BUILDINGS, 2016, 116 :703-708
[10]   On the design of a secure user authentication and key agreement scheme for wireless sensor networks [J].
Kumari, Saru ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Li, Xiong ;
Wu, Fan ;
Choo, Kim-Kwang Raymond ;
Khan, Muhammad Khurram .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)