Authentication Protocol for Distributed Cloud Computing An explanation of the security situation for Internet-of-Things-enabled devices

被引:27
|
作者
Wu, Fan [1 ]
Li, Xiong [2 ]
Xu, Lili [3 ]
Sangaiah, Arun Kumar [4 ]
Rodrigues, Joel J. P. C. [5 ,6 ,7 ,8 ]
机构
[1] Xiamen Inst Technol, Xiamen, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Zhuzhou, Peoples R China
[3] Xiamen Univ, Xiamen, Peoples R China
[4] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[5] Natl Inst Telecommun, Santa Rita Do Sapucai, Brazil
[6] Inst Telecommun, Coimbra, Portugal
[7] ITMO Univ, St Petersburg, Russia
[8] Univ Fortaleza, Fortaleza, Ceara, Brazil
基金
中国国家自然科学基金;
关键词
MULTISERVER ARCHITECTURE; SENSOR NETWORKS; KEY AGREEMENT; SMART CARDS; EFFICIENT; SCHEME; ENVIRONMENT;
D O I
10.1109/MCE.2018.2851744
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a popular conception, the Internet of Things (IoT) allows people to access more and more data around the world. However, a concern arises of how to store the large amount of data created through this technology. To solve the problem, cloud computing services are brought in as a critical technology. However, it is necessary to guard the private information that is collected via IoT devices and stored in distributed cloud servers. Though authentication schemes are provided, many security weaknesses exist. We present an advanced authentication scheme for cloud computing using only hash functions and exclusive or computations that are suitable for IoT devices, which tend to have limited computation and storage abilities. © 2012 IEEE.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 50 条
  • [21] Security of a New Lightweight Authentication and Key Agreement Protocol for Internet of Things
    Fan, Xiaohong
    Niu, Baoli
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 107 - 111
  • [22] Electromagnetic radiation based continuous authentication in edge computing enabled internet of things
    Wang, Jun
    Ni, Mingtao
    Wu, Fusheng
    Liu, Shubo
    Qin, Jun
    Zhu, Rongbo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 96 : 53 - 61
  • [23] Internet of Things Information System Security for Smart Devices Identification and Authentication
    Savukynas, Raimundas
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 168 - 172
  • [24] Network Security Protocol For Constrained Resource Devices In Internet Of Things
    Mishra, Sumit
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [25] Artificial Intelligence Enabled Distributed Edge Computing for Internet of Things Applications
    Fragkos, Georgios
    Tsiropoulou, Eirini Eleni
    Papavassiliou, Symeon
    16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 450 - 457
  • [26] Special Issue on security and privacy in Internet of Things and cloud computing systems
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Rodrigues, Joel J. P. C.
    Awad, Ahmed
    SECURITY AND PRIVACY, 2018, 1 (03):
  • [27] Security authentication protocol for online English teaching system based on Internet of Things
    Wang, Yuanfen
    Fan, Debin
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 122 : 533 - 542
  • [28] Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things
    Alshaeri, Abdulaziz
    Younis, Mohamed
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 152 - 158
  • [29] A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things
    Ding, Xuyang
    Wang, Xiaoxiang
    Xie, Ying
    Li, Fagen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 1818 - 1829
  • [30] DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things
    Chi, Haotian
    Jakielaszek, Luke
    Du, Xiaojiang
    Ratazzi, E. Paul
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2212 - 2217