Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

被引:6
|
作者
Wu, Tsu-Yang [1 ]
Kong, Fangfang [1 ]
Meng, Qian [1 ]
Kumari, Saru [2 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
IoT; Cloud computing; Authentication; Cryptanalysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; EFFICIENT; INTERNET; NETWORKS; POWER;
D O I
10.1186/s13638-023-02245-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users' access to information at any time, and provides users with corresponding cloud computing services on time. Because the information transmitted through public channels is easily intercepted, tampered with, and eavesdropped on by malicious attackers. As a result, users' and servers' private information are disclosed. Numerous scholars have proposed different authentication protocols in this environment to protect the communications between users and servers. Amin et al. devised a smart card based authentication protocol. Unfortunately, Kang et al. demonstrated that their protocol was insecure. Huang et al. discovered Kang et al.'s improvement also has security flaws and then designed a protocol to enhance security. In this paper, we first show that Huang et al.'s protocol cannot resist privileged insider and temporary value disclosure attacks. Afterward, we propose an enhanced protocol based on their protocol. Finally, we use formal/informal security analysis to demonstrate the security of the improved protocol. The comparison results are indicated that our protocol has lower computational and communication costs under the same security level.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
    Chen, Chien-Ming
    Chen, Zhaoting
    Kumari, Saru
    Obaidat, Mohammad S.
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25394 - 25412
  • [32] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [33] Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Huang, Yanyu
    Chen, Chien-Ming
    Chen, Yeh-Cheng
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [34] Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Mishra, Dheerendra
    Vijayakumar, P.
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Islam, S. K. Hafizul
    Gope, Prosanta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18295 - 18325
  • [35] A New Security Middleware Architecture Based on Fog Computing and Cloud To Support IoT Constrained Devices
    Razouk, Wissam
    Sgandurra, Daniele
    Sakurai, Kouichi
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND MACHINE LEARNING (IML'17), 2017,
  • [36] An improved authentication protocol for distributed mobile cloud computing services
    Jannati, Hoda
    Bahrak, Behnam
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 59 - 67
  • [37] Constrained Multiobjective Optimization for IoT-Enabled Computation Offloading in Collaborative Edge and Cloud Computing
    Peng, Guang
    Wu, Huaming
    Wu, Han
    Wolter, Katinka
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17): : 13723 - 13736
  • [38] Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system
    Khan, Sheharyar
    Jiangbin, Zheng
    Ullah, Farhan
    Akhter, Muhammad Pervez
    Khan, Sohrab
    Awwad, Fuad A.
    Ismail, Emad A. A.
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [39] Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system
    Khan, Sheharyar
    Jiangbin, Zheng
    Ullah, Farhan
    Akhter, Muhammad Pervez
    Khan, Sohrab
    Awwad, Fuad A.
    Ismail, Emad A.A.
    PeerJ Computer Science, 2024, 10
  • [40] NSF GENI Cloud Enabled Architecture for Distributed Scientific Computing
    Hwang, Tae
    2017 IEEE AEROSPACE CONFERENCE, 2017,