A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure
المؤلفون المشاركون
Xu, Guoai
Wang, Feifei
Peng, Junhao
Xu, Guosheng
Wang, Yuejie
المصدر
Wireless Communications and Mobile Computing
العدد
المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-15، 15ص.
الناشر
Hindawi Publishing Corporation
تاريخ النشر
2020-02-18
دولة النشر
مصر
عدد الصفحات
15
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
الملخص EN
With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily lives.
As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled devices.
It is playing an increasingly important role in resource sharing.
Due to the complexity and openness of wireless networks, the authentication protocol is crucial for secure communication and user privacy protection.
In this paper, we discuss the limitations of a recently introduced IoT-based authentication scheme for cloud computing.
Furthermore, we present an enhanced three-factor authentication scheme using chaotic maps.
The session key is established based on Chebyshev chaotic-based Diffie–Hellman key exchange.
In addition, the session key involves a long-term secret.
It ensures that our scheme is secure against all the possible session key exposure attacks.
Besides, our scheme can effectively update user password locally.
Burrows–Abadi–Needham logic proof confirms that our scheme provides mutual authentication and session key agreement.
The formal analysis under random oracle model proves the semantic security of our scheme.
The informal analysis shows that our scheme is immune to diverse attacks and has desired features such as three-factor secrecy.
Finally, the performance comparisons demonstrate that our scheme provides optimal security features with an acceptable computation and communication overheads.
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. 2020. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing،Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Wang, Feifei…[et al.]. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing No. 2020 (2020), pp.1-15.
https://search.emarefa.net/detail/BIM-1214409
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing. 2020. Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409
نوع البيانات
مقالات
لغة النص
الإنجليزية
الملاحظات
Includes bibliographical references
رقم السجل
BIM-1214409
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر