A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Joint Authors

Xu, Guoai
Wang, Feifei
Peng, Junhao
Xu, Guosheng
Wang, Yuejie

Source

Wireless Communications and Mobile Computing

Issue

Vol. 2020, Issue 2020 (31 Dec. 2020), pp.1-15, 15 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2020-02-18

Country of Publication

Egypt

No. of Pages

15

Main Subjects

Information Technology and Computer Science

Abstract EN

With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily lives.

As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled devices.

It is playing an increasingly important role in resource sharing.

Due to the complexity and openness of wireless networks, the authentication protocol is crucial for secure communication and user privacy protection.

In this paper, we discuss the limitations of a recently introduced IoT-based authentication scheme for cloud computing.

Furthermore, we present an enhanced three-factor authentication scheme using chaotic maps.

The session key is established based on Chebyshev chaotic-based Diffie–Hellman key exchange.

In addition, the session key involves a long-term secret.

It ensures that our scheme is secure against all the possible session key exposure attacks.

Besides, our scheme can effectively update user password locally.

Burrows–Abadi–Needham logic proof confirms that our scheme provides mutual authentication and session key agreement.

The formal analysis under random oracle model proves the semantic security of our scheme.

The informal analysis shows that our scheme is immune to diverse attacks and has desired features such as three-factor secrecy.

Finally, the performance comparisons demonstrate that our scheme provides optimal security features with an acceptable computation and communication overheads.

American Psychological Association (APA)

Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. 2020. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing،Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

Modern Language Association (MLA)

Wang, Feifei…[et al.]. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing No. 2020 (2020), pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

American Medical Association (AMA)

Wang, Feifei& Xu, Guosheng& Xu, Guoai& Wang, Yuejie& Peng, Junhao. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wireless Communications and Mobile Computing. 2020. Vol. 2020, no. 2020, pp.1-15.
https://search.emarefa.net/detail/BIM-1214409

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1214409