A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud

被引:0
|
作者
Ehuil, Brou Bernard [1 ]
Chen, Chen [1 ,2 ]
Wang, Shirui [3 ,4 ]
Guo, Hua [1 ,2 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Beihang Univ, Sino French Engn Sch, Beijing 100191, Peoples R China
[4] Beihang Hangzhou Innovat Inst Yuhang, Hangzhou 310051, Peoples R China
关键词
Internet of things; Visual cryptography; Security; Mutual authentication; IoT-cloud;
D O I
10.23919/cje.2022.00.339
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the user accessing the cloud services. The conventional cryptographic algorithms used to provide security mechanisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks. Therefore, developing new solutions based on different mechanisms from traditional cryptography methods is required to protect data and users' privacy from attacks. Different from the conventional cryptography method, we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper. We use visual cryptography to encrypt and decrypt the secret images. The mutual authentication is based on two secret images and tickets. The user requests the ticket from the authentication server (AS) to obtain the permission for accessing the cloud services. Three shared secret keys are used for encrypting and decrypting the authentication process. We analyze the protocol using the Barrows-Abadi-Needham (BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks. Also, it can provide a secure mutual authentication mechanism.
引用
收藏
页码:43 / 57
页数:15
相关论文
共 50 条
  • [41] Cloud-based Lightweight RFID Mutual Authentication Protocol
    Fan, Kai
    Luo, Qi
    Li, Hui
    Yang, Yintang
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 333 - 338
  • [42] Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems
    Mangala, N.
    Reddy, B. Eswara
    Venugopal, K. R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 845 - 858
  • [43] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [44] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    [J]. Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [45] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [46] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    K. Selvi
    K. Muthumanickam
    P. Vijayalakshmi
    P. C. Senthil Mahesh
    [J]. The Journal of Supercomputing, 2023, 79 : 12191 - 12218
  • [47] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [48] A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
    Alzahrani, Bander A.
    Irshad, Azeem
    Alsubhi, Khalid
    Albeshri, Aiiad
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [49] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336
  • [50] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (11): : 12191 - 12218