Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

被引:6
|
作者
Wu, Tsu-Yang [1 ]
Kong, Fangfang [1 ]
Meng, Qian [1 ]
Kumari, Saru [2 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
IoT; Cloud computing; Authentication; Cryptanalysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; EFFICIENT; INTERNET; NETWORKS; POWER;
D O I
10.1186/s13638-023-02245-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users' access to information at any time, and provides users with corresponding cloud computing services on time. Because the information transmitted through public channels is easily intercepted, tampered with, and eavesdropped on by malicious attackers. As a result, users' and servers' private information are disclosed. Numerous scholars have proposed different authentication protocols in this environment to protect the communications between users and servers. Amin et al. devised a smart card based authentication protocol. Unfortunately, Kang et al. demonstrated that their protocol was insecure. Huang et al. discovered Kang et al.'s improvement also has security flaws and then designed a protocol to enhance security. In this paper, we first show that Huang et al.'s protocol cannot resist privileged insider and temporary value disclosure attacks. Afterward, we propose an enhanced protocol based on their protocol. Finally, we use formal/informal security analysis to demonstrate the security of the improved protocol. The comparison results are indicated that our protocol has lower computational and communication costs under the same security level.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Alawi A. Al-saggaf
    Tarek Sheltami
    Hoda Alkhzaimi
    Gamil Ahmed
    Arabian Journal for Science and Engineering, 2023, 48 : 2347 - 2357
  • [22] Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing
    Al-saggaf, Alawi A.
    Sheltami, Tarek
    Alkhzaimi, Hoda
    Ahmed, Gamil
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2347 - 2357
  • [23] LASUA: A Lightweight Authentication Scheme with User Anonymity for IoT-Enabled Mobile Cloud
    Amande, Vincent
    Kaur, Kuljeet
    Garg, Sahil
    Guizani, Mohsen
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3563 - 3568
  • [24] One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible
    Banda G.
    Bommakanti C.K.
    Mohan H.
    Journal of Reliable Intelligent Environments, 2016, 2 (3) : 131 - 144
  • [25] Mutual authentication scheme for smart devices in IoT-enabled smart home systems
    Ma, Qingru
    Tan, Haowen
    Zhou, Tianqi
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [26] A deep learning-based authentication protocol for IoT-enabled LTE systems
    Rao, A. Sai Venkateshwar
    Roy, Prasanta Kumar
    Amgoth, Tarachand
    Bhattacharya, Ansuman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 154 : 451 - 464
  • [27] A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System
    Chen, Chen
    Guo, Hua
    Wu, Yapeng
    Shen, Bowen
    Ding, Mingyang
    Liu, Jianwei
    SENSORS, 2023, 23 (08)
  • [28] An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach
    Zhang, Jun
    Wang, Yichuan
    Li, Shuyang
    Shi, Shuaiyi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08): : 6205 - 6213
  • [29] A Novel Approach of Cloud Computing Network for Authentication and Security Enhancement of IoT Enabled Cancer Forecasting System
    Ampavathi, Anusha
    Rao, Dhawaleswar
    Nagalakshmi, T.
    Muruganandam, S.
    Magendiran, N.
    Padmaja, I. Naga
    Selvam, K.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (07) : 518 - 534
  • [30] Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Dheerendra Mishra
    P. Vijayakumar
    Venkatasamy Sureshkumar
    Ruhul Amin
    SK Hafizul Islam
    Prosanta Gope
    Multimedia Tools and Applications, 2018, 77 : 18295 - 18325