Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

被引:3
|
作者
Wu, Tsu-Yang [1 ]
Kong, Fangfang [1 ]
Meng, Qian [1 ]
Kumari, Saru [2 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
IoT; Cloud computing; Authentication; Cryptanalysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; EFFICIENT; INTERNET; NETWORKS; POWER;
D O I
10.1186/s13638-023-02245-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users' access to information at any time, and provides users with corresponding cloud computing services on time. Because the information transmitted through public channels is easily intercepted, tampered with, and eavesdropped on by malicious attackers. As a result, users' and servers' private information are disclosed. Numerous scholars have proposed different authentication protocols in this environment to protect the communications between users and servers. Amin et al. devised a smart card based authentication protocol. Unfortunately, Kang et al. demonstrated that their protocol was insecure. Huang et al. discovered Kang et al.'s improvement also has security flaws and then designed a protocol to enhance security. In this paper, we first show that Huang et al.'s protocol cannot resist privileged insider and temporary value disclosure attacks. Afterward, we propose an enhanced protocol based on their protocol. Finally, we use formal/informal security analysis to demonstrate the security of the improved protocol. The comparison results are indicated that our protocol has lower computational and communication costs under the same security level.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
    Tsu-Yang Wu
    Fangfang Kong
    Qian Meng
    Saru Kumari
    Chien-Ming Chen
    [J]. EURASIP Journal on Wireless Communications and Networking, 2023
  • [2] Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
    Wu, Tsu-Yang
    Meng, Qian
    Kumari, Saru
    Zhang, Peng
    [J]. SENSORS, 2022, 22 (10)
  • [3] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [4] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [5] Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
    Li, Zhen
    Yang, Lei
    Wu, Tsu-Yang
    Chen, Chien-Ming
    [J]. ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 339 - 347
  • [6] Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
    Kang, Baoyuan
    Han, Yanbao
    Qian, Kun
    Du, Jianqi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [7] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
    Amin, Ruhul
    Kumar, Neeraj
    Biswas, G. P.
    Iqbal, R.
    Chang, Victor
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
  • [8] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [9] Authentication Protocol for Distributed Cloud Computing An explanation of the security situation for Internet-of-Things-enabled devices
    Wu, Fan
    Li, Xiong
    Xu, Lili
    Sangaiah, Arun Kumar
    Rodrigues, Joel J. P. C.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (06) : 38 - 44
  • [10] SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing
    Wu, Tsu-Yang
    Wang, Liyang
    Guo, Xinglan
    Chen, Yeh-Cheng
    Chu, Shu-Chuan
    [J]. SUSTAINABILITY, 2022, 14 (17)