Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

被引:6
|
作者
Wu, Tsu-Yang [1 ]
Kong, Fangfang [1 ]
Meng, Qian [1 ]
Kumari, Saru [2 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
IoT; Cloud computing; Authentication; Cryptanalysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; EFFICIENT; INTERNET; NETWORKS; POWER;
D O I
10.1186/s13638-023-02245-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users' access to information at any time, and provides users with corresponding cloud computing services on time. Because the information transmitted through public channels is easily intercepted, tampered with, and eavesdropped on by malicious attackers. As a result, users' and servers' private information are disclosed. Numerous scholars have proposed different authentication protocols in this environment to protect the communications between users and servers. Amin et al. devised a smart card based authentication protocol. Unfortunately, Kang et al. demonstrated that their protocol was insecure. Huang et al. discovered Kang et al.'s improvement also has security flaws and then designed a protocol to enhance security. In this paper, we first show that Huang et al.'s protocol cannot resist privileged insider and temporary value disclosure attacks. Afterward, we propose an enhanced protocol based on their protocol. Finally, we use formal/informal security analysis to demonstrate the security of the improved protocol. The comparison results are indicated that our protocol has lower computational and communication costs under the same security level.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Damandeep Kaur
    Khushil Kumar Saini
    Devender Kumar
    Multimedia Tools and Applications, 2022, 81 : 39367 - 39385
  • [42] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [43] A novel protocol for efficient authentication in cloud-based IoT devices
    Irfan Alam
    Manoj Kumar
    Multimedia Tools and Applications, 2022, 81 : 13823 - 13843
  • [44] A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems
    Zhang, Peiying
    Wang, Yaqi
    Aujla, Gagangeet Singh
    Jindal, Anish
    Al-Otaibi, Yasser D.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2322 - 2331
  • [45] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Kaur, Damandeep
    Saini, Khushil Kumar
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39367 - 39385
  • [46] A computation offloading method over big data for IoT-enabled cloud-edge computing
    Xu, Xiaolong
    Liu, Qingxiang
    Luo, Yun
    Peng, Kai
    Zhang, Xuyun
    Meng, Shunmei
    Qi, Lianyong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 522 - 533
  • [47] RAAF-MEC: Reliable and anonymous authentication framework for IoT-enabled mobile edge computing environment
    Alruwaili, Omar
    Tanveer, Muhammad
    Aldossari, Saud Alhajaj
    Alanazi, Saad
    Armghan, Ammar
    INTERNET OF THINGS, 2025, 29
  • [48] Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing
    Seifelnasr, Mohamed
    AlTawy, Riham
    Youssef, Amr
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (04): : 4420 - 4433
  • [49] Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid
    Sonker, Sanjay Kumar
    Raina, Vibha Kaw
    Sagar, Bharat Bhushan
    Bansal, Ramesh C.
    ELECTRICAL ENGINEERING, 2024, 106 (02) : 1339 - 1355
  • [50] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)