Abstract

Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.

Highlights

  • With the development of the Internet technology, people’s life and production have been greatly improved by Internet of ings (IoT) [1]

  • Amin et al [13] showed security vulnerabilities of two authentication protocols in multiserver cloud environment proposed by Xue et al [11] and Chuang and Chen [12]. en, Amin et al [13] proposed an authentication protocol for IoT-enabled devices in distributed cloud computing environment. ey claimed that the proposed protocol is protected against all possible security threats

  • In this paper, we find that Amin et al.’s protocol is vulnerable to several weaknesses

Read more

Summary

Introduction

With the development of the Internet technology, people’s life and production have been greatly improved by Internet of ings (IoT) [1]. Amin et al [13] showed security vulnerabilities of two authentication protocols in multiserver cloud environment proposed by Xue et al [11] and Chuang and Chen [12]. En, Amin et al [13] proposed an authentication protocol for IoT-enabled devices in distributed cloud computing environment. During the registration phase of Amin et al.’s protocol, it is unreasonable for a user to register with a pseudoidentity. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. Amin et al.’s protocol [13] contains five phases: registration, login, authentication and key agreement, password change, and identity update. It is unreasonable for a user to register with a pseudoidentity

Weaknesses in Authentication and Key Agreement
The Improved Protocol
Security Analysis and Comparisons
F2 F3 F4 F5 F6 F7
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.