Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function

被引:1
|
作者
Taher, Bahaa Hussein [1 ,2 ]
Wei, Lu Hong [1 ]
Yassin, Ali A. [3 ]
机构
[1] Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Basra Univ, Coll Sci, Math Sci Dept, Basra 61004, Iraq
[3] Basra Univ, Educ Coll Pure Sci, Dept Comp Sci, Basra 61004, Iraq
来源
PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018) | 2018年
关键词
IoT Cloud; Mutual Authentication; MITM Attack; Preserving Privacy; Embedded device; INTERNET; SECURE;
D O I
10.1145/3297156.3297220
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things and cloud computing (IoT Cloud) have a wide resonance in the Internet and modern communication technology, which allows laptops, phones, sensors, embedded devices, and other things to connect and exchange information via the Internet. Therefore, IoT Cloud offers several facilities, such as resources, storage, sharing, exchange, and communication. However, IoT Cloud suffers from security problems, which are a vital issue in the information technology world. All embedded devices in IoT Cloud need to be supported by strong authentication and preservation of privacy data during information exchange via the IoT Cloud environment. Malicious attacks (such as replay, man-in-the-middle [MITM], and impersonation attacks) play the negative role of obtaining important information of devices. In this study, we propose a good scheme that overcomes the mentioned issues by resisting well-known attacks, such as MITM, insider, offline password guessing, dictionary, replay, and eavesdropping. Our work achieves device anonymity, forward secrecy, confidentiality, and mutual authentication. Security and performance analyses show that our proposed scheme is more efficient, flexible, and secure with respect to several known attacks compared with related schemes.
引用
收藏
页码:487 / 494
页数:8
相关论文
共 50 条
  • [1] A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3474 - 3484
  • [2] A secure and efficient mutual authentication protocol using hash function
    Lin, Sida
    Xie, Qi
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 545 - +
  • [3] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    Pervasive Mob. Comput., (210-223):
  • [4] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [5] Comments on the Authentication Scheme for IoT and Cloud Servers
    Cheng, Ting-Fang
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 7 - 8
  • [6] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    Pervasive and Mobile Computing, 2015, 24 : 210 - 223
  • [7] Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
    Nabeel, Nubila
    Habaebi, Mohamed Hadi
    Islam, M. D. Rafiqul
    IEEE ACCESS, 2021, 9 : 165754 - 165765
  • [8] A secure user authentication scheme for crypto-wallet in IoT environment
    Truong, Toan-Thinh
    Tran, Minh-Triet
    Duong, Anh-Duc
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3025 - 3048
  • [9] Efficient multicast source authentication using layered hash-chaining scheme
    Challal, Y
    Bouabdallah, A
    Hinard, Y
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 411 - 412
  • [10] Secure and Efficient Authentication Scheme in IoT Environments
    Thakare, Abhijeet
    Kim, Young-Gab
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27