Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Analysis and improvement on an authentication protocol for IoT-enabled devices in distributed cloud computing environment - MaRDI portal

Analysis and improvement on an authentication protocol for IoT-enabled devices in distributed cloud computing environment (Q779491)

From MaRDI portal





scientific article; zbMATH DE number 7219918
Language Label Description Also known as
English
Analysis and improvement on an authentication protocol for IoT-enabled devices in distributed cloud computing environment
scientific article; zbMATH DE number 7219918

    Statements

    Analysis and improvement on an authentication protocol for IoT-enabled devices in distributed cloud computing environment (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    13 July 2020
    0 references
    Summary: Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.'s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.'s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.'s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.'s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server's secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references