A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

2018 ◽  
Vol 78 ◽  
pp. 1005-1019 ◽  
Author(s):  
Ruhul Amin ◽  
Neeraj Kumar ◽  
G.P. Biswas ◽  
R. Iqbal ◽  
Victor Chang
2020 ◽  
Vol 2020 ◽  
pp. 1-6
Author(s):  
Baoyuan Kang ◽  
Yanbao Han ◽  
Kun Qian ◽  
Jianqi Du

Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.


2013 ◽  
Vol 284-287 ◽  
pp. 3502-3506 ◽  
Author(s):  
Shu Ching Wang ◽  
Wen Pin Liao ◽  
Kuo Qin Yan ◽  
Shun Sheng Wang ◽  
Szu Hao Tsai

Nowadays, network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. However, cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. According to the characteristics of cloud computing, there are a lot of applications and data centers in the cloud-computing environment, hence, the issues of information and communication security and authentication must to be considered. However, the most of the studies on the security and authentication require large amounts of computing resource; therefore not suitable for the cloud-computing environment. In this paper, a lightweight computing protocol, Lightweight Authentication Protocol (LAP), is proposed to enhance the security of cloud computing environment and provide the authentication of service.


Sign in / Sign up

Export Citation Format

Share Document