Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment

被引:0
|
作者
Li, Zhen [1 ]
Yang, Lei [1 ]
Wu, Tsu-Yang [1 ]
Chen, Chien-Ming [1 ]
机构
[1] Shandong Univ Sci & Technol, Sch Comp Sci & Technol, Qingdao, Shandong, Peoples R China
关键词
SCHEME; SECURE;
D O I
10.1007/978-981-16-8048-9_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, more and more authentication protocols combining cloud computing and IoT are proposed for secure communication and access of the Internet of things. In 2020, Kang et al. Proposed a mutual authentication protocol based on distributed cloud computing environment for secure communication. They claim that their agreement can withstand all kinds of attacks. Unfortunately, this paper certificates that Kang et al.'s scheme is very vulnerable to temporary information attack of specific session.
引用
收藏
页码:339 / 347
页数:9
相关论文
共 50 条
  • [1] Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
    Kang, Baoyuan
    Han, Yanbao
    Qian, Kun
    Du, Jianqi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [2] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
    Amin, Ruhul
    Kumar, Neeraj
    Biswas, G. P.
    Iqbal, R.
    Chang, Victor
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
  • [3] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [4] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    [J]. EURASIP Journal on Wireless Communications and Networking, 2021
  • [5] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
    Wu, Tsu-Yang
    Kong, Fangfang
    Meng, Qian
    Kumari, Saru
    Chen, Chien-Ming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [6] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
    Tsu-Yang Wu
    Fangfang Kong
    Qian Meng
    Saru Kumari
    Chien-Ming Chen
    [J]. EURASIP Journal on Wireless Communications and Networking, 2023
  • [7] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01): : 867 - 876
  • [8] Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
    Wu, Tsu-Yang
    Meng, Qian
    Kumari, Saru
    Zhang, Peng
    [J]. SENSORS, 2022, 22 (10)
  • [9] SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing
    Wu, Tsu-Yang
    Wang, Liyang
    Guo, Xinglan
    Chen, Yeh-Cheng
    Chu, Shu-Chuan
    [J]. SUSTAINABILITY, 2022, 14 (17)
  • [10] Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
    Wang, Ping
    Li, Bin
    Shi, Hongjin
    Shen, Yaosheng
    Wang, Ding
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019,