Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments

Joint Authors

Wang, Ding
Wang, Ping
Li, Bin
Shi, Hongjin
Shen, Yaosheng

Source

Security and Communication Networks

Issue

Vol. 2019, Issue 2019 (31 Dec. 2019), pp.1-13, 13 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2019-05-23

Country of Publication

Egypt

No. of Pages

13

Main Subjects

Information Technology and Computer Science

Abstract EN

Investigating the security pitfalls of cryptographic protocols is crucial to understand how to improve security.

At ICCCS’17, Wu and Xu proposed an efficient smart-card-based password authentication scheme for cloud computing environments to cope with the vulnerabilities in Jiang et al.’s scheme.

However, we reveal that Wu-Xu’s scheme actually is subject to various security flaws, such as offline password guessing attack and replay attack.

Besides security, user friendly is also another great concern.

In 2017, Roy et al.

found that in most previous two-factor schemes a user has to manage different credentials for different services and further suggested a user-friendly scheme which is claimed to be suitable for multiserver architecture and robust against various attacks.

In this work, we show that Roy et al.’s scheme fails to achieve truly two-factor security and shows poor scalability.

At FGCS’18, Amin et al.

pointed out that most of existing two-factor schemes are either insecure or inefficient for mobile devices due to the use of public-key techniques and thus suggested an improved protocol by using only light-weight symmetric key techniques.

Almost at the same time, Wei et al.

also observed this issue and proposed a new scheme based on symmetric key techniques with formal security proofs in the random oracle model.

Nevertheless, we point out that both Amin et al.’s and Wei et al.’s schemes cannot achieve the claimed security goals (including the most crucial goal of “truly two-factor security”).

Our results invalidate any use of the scrutinized schemes for cloud computing environments.

American Psychological Association (APA)

Wang, Ping& Li, Bin& Shi, Hongjin& Shen, Yaosheng& Wang, Ding. 2019. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. Security and Communication Networks،Vol. 2019, no. 2019, pp.1-13.
https://search.emarefa.net/detail/BIM-1210317

Modern Language Association (MLA)

Wang, Ping…[et al.]. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. Security and Communication Networks No. 2019 (2019), pp.1-13.
https://search.emarefa.net/detail/BIM-1210317

American Medical Association (AMA)

Wang, Ping& Li, Bin& Shi, Hongjin& Shen, Yaosheng& Wang, Ding. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. Security and Communication Networks. 2019. Vol. 2019, no. 2019, pp.1-13.
https://search.emarefa.net/detail/BIM-1210317

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1210317