scholarly journals An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2098 ◽  
Author(s):  
Rafael Martínez-Peláez ◽  
Homero Toral-Cruz ◽  
Jorge R. Parra-Michel ◽  
Vicente García ◽  
Luis J. Mena ◽  
...  

With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5604
Author(s):  
Hsiao-Ling Wu ◽  
Chin-Chen Chang ◽  
Yao-Zhu Zheng ◽  
Long-Sheng Chen ◽  
Chih-Cheng Chen

The Internet of Things (IoT) is currently the most popular field in communication and information techniques. However, designing a secure and reliable authentication scheme for IoT-based architectures is still a challenge. In 2019, Zhou et al. showed that schemes pro-posed by Amin et al. and Maitra et al. are vulnerable to off-line guessing attacks, user tracking attacks, etc. On this basis, a lightweight authentication scheme based on IoT is proposed, and an authentication scheme based on IoT is proposed, which can resist various types of attacks and realize key security features such as user audit, mutual authentication, and session security. However, we found weaknesses in the scheme upon evaluation. Hence, we proposed an enhanced scheme based on their mechanism, thus achieving the security requirements and resisting well-known attacks.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2014 ◽  
Vol 989-994 ◽  
pp. 2349-2355
Author(s):  
Kang Kang Chen ◽  
Chen Lei Cao ◽  
Jian Yi Liu ◽  
Ru Zhang

In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on this security architecture and BFIBE, three security protocols are proposed to implement mutual authentication and key agreement, which can resist man-in-middle attacks and masquerading attacks. Besides, based the three protocols, an effective data sharing method is proposed.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-19
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Azeem Irshad ◽  
Khalid Yahya ◽  
Neeraj Kumar ◽  
Mamoun Alazab ◽  
...  

The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3695 ◽  
Author(s):  
Yuwen Chen ◽  
José-Fernán Martínez ◽  
Pedro Castillejo ◽  
Lourdes López

The Internet of Things (IoT) connects different kinds of devices into a network, and enables two-way communication between devices. A large amount of data are collected by these devices and transmitted in this network, it is necessary to ensure secure communications between these devices, to make it impossible for an adversary to undermine this communication. To ensure secure communication, many authentication protocols have been proposed, in this study, a fully anonymous authentication scheme for the Internet of things scenario has been proposed, it enables the remote client to anonymously connect to the server and being serviced by the server. The proposed scheme has been verified by AVISPA and BAN Logic, and the result shows that it is safe. Besides, the simulation shows that the proposed scheme is more efficient in computation cost and communication cost.


Author(s):  
Jiangfeng Sun ◽  
Fazlullah Khan ◽  
Junxia Li ◽  
Mohammad Dahman Alshehri ◽  
Ryan Alturki ◽  
...  

Author(s):  
Kai Zhang

With the development of emerging technology innovations such as the internet of things, classroom management has also shown an informatization trend. Among them, smart classrooms are an important part of the current university information environment construction. The purpose of this article is to build a smart classroom into an intelligent teaching environment with many functions such as intelligent perception and identification, real-time monitoring based on the internet of things technology and cloud computing technology. A questionnaire survey was conducted among freshman students in some majors, and interviews were conducted with the instructors. It was found that 92.19% of the students were satisfied with the classroom learning in the smart classroom environment, and most teachers thought that the teaching effect had been improved. Experiments have proven that the operation of smart classrooms based on the internet of things and cloud computing realizes the intelligence of teaching management services and improves the level of education informationization in schools.


Author(s):  
Leila Zemmouchi-Ghomari

Industry 4.0 is a technology-driven manufacturing process that heavily relies on technologies, such as the internet of things (IoT), cloud computing, web services, and big real-time data. Industry 4.0 has significant potential if the challenges currently being faced by introducing these technologies are effectively addressed. Some of these challenges consist of deficiencies in terms of interoperability and standardization. Semantic Web technologies can provide useful solutions for several problems in this new industrial era, such as systems integration and consistency checks of data processing and equipment assemblies and connections. This paper discusses what contribution the Semantic Web can make to Industry 4.0.


Sign in / Sign up

Export Citation Format

Share Document