A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

المؤلفون المشاركون

Xu, Guoai
Wang, Feifei
Peng, Junhao
Xu, Guosheng
Wang, Yuejie

المصدر

Wireless Communications and Mobile Computing

العدد

المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-15، 15ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2020-02-18

دولة النشر

مصر

عدد الصفحات

15

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الملخص EN

With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily lives.

As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled devices.

It is playing an increasingly important role in resource sharing.

Due to the complexity and openness of wireless networks, the authentication protocol is crucial for secure communication and user privacy protection.

In this paper, we discuss the limitations of a recently introduced IoT-based authentication scheme for cloud computing.

Furthermore, we present an enhanced three-factor authentication scheme using chaotic maps.

The session key is established based on Chebyshev chaotic-based Diffie–Hellman key exchange.

In addition, the session key involves a long-term secret.

It ensures that our scheme is secure against all the possible session key exposure attacks.

Besides, our scheme can effectively update user password locally.

Burrows–Abadi–Needham logic proof confirms that our scheme provides mutual authentication and session key agreement.

The formal analysis under random oracle model proves the semantic security of our scheme.

The informal analysis shows that our scheme is immune to diverse attacks and has desired features such as three-factor secrecy.

Finally, the performance comparisons demonstrate that our scheme provides optimal security features with an acceptable computation and communication overheads.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. 2020. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing،Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Wang, Feifei…[et al.]. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing No. 2020 (2020), pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing. 2020. Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1214409