Abstract
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.
Highlights
With the development of the Internet technology, people’s life and production have been greatly improved by Internet of ings (IoT) [1]
Amin et al [13] showed security vulnerabilities of two authentication protocols in multiserver cloud environment proposed by Xue et al [11] and Chuang and Chen [12]. en, Amin et al [13] proposed an authentication protocol for IoT-enabled devices in distributed cloud computing environment. ey claimed that the proposed protocol is protected against all possible security threats
In this paper, we find that Amin et al.’s protocol is vulnerable to several weaknesses
Summary
With the development of the Internet technology, people’s life and production have been greatly improved by Internet of ings (IoT) [1]. Amin et al [13] showed security vulnerabilities of two authentication protocols in multiserver cloud environment proposed by Xue et al [11] and Chuang and Chen [12]. En, Amin et al [13] proposed an authentication protocol for IoT-enabled devices in distributed cloud computing environment. During the registration phase of Amin et al.’s protocol, it is unreasonable for a user to register with a pseudoidentity. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. Amin et al.’s protocol [13] contains five phases: registration, login, authentication and key agreement, password change, and identity update. It is unreasonable for a user to register with a pseudoidentity
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.