1. Introduction
With the recent advances in wireless sensor networks and embedded technologies, internet of things (IoT) connects objects and shares various useful data with internet through resource-constrained devices to provide convenient services for users such as smart home, healthcare, vehicle to everything and smart gird. However, a single server environment also is inefficient for IoT because an ocean of data is generated by resource-constrained devices such as microsensor, RFID tag and smart cards.
Cloud computing is a distributed computing mechanism for a large-scale data and allows sharing resources among all of the servers and users. The cloud computing provides five essential characteristics:
on-demand self-services,
ubiquitous network access,
rapid elasticity,
measured service and
resource pooling [
1,
2].
On-demand self-service handles cloud services without human interaction and
ubiquitous network access controls access service using standard protocols.
Rapid elasticity and
measured service optimize the resource usage.
Resource pooling provides cloud service using homogeneous infrastructure among service users. The cloud computing deals with an ocean of data generated by devices and sensors and provides data managing service for users through these essential characteristics.
However, these services are vulnerable to potential attacks by malicious adversaries because they are provided through an open channel, including sensitive data of legitimate user about location, health, payment, etc. Therefore, a secure and efficient authentication for IoT environment has become essential security requirements to provide useful services to user.
In 1981, Lamport [
3] proposed one factor user authentication scheme using passwords to ensure user’s privacy. However, security of the password based authentication scheme is easily broken because its security only relies on the passwords. In 2002, Chien et al. proposed two factor authentication scheme to overcome this security flaw using password and smart cards. However, their scheme is vulnerable to smart card stolen attack as the data stored in smart cards can be extracted by power analysis attacks [
4]. When a malicious adversary obtains smart cards and password, they can perform various attacks such as impersonation, replay and insider attacks. To overcome the above-mentioned security weaknesses, three-factor authentication schemes have been proposed [
5,
6,
7]. Biometrics (e.g., face, retina, fingerprint, iris, etc.) have several important characteristics: they cannot be lost or forgotten; they are hard to forge, copy, share or distribute; and they are difficult to guess.
In 2019, Pelaez et al. [
8] demonstrated that the previous scheme is vulnerable to insider, off-line guessing and disclosure attacks and proposed enhanced IoT-based authentication scheme in cloud computing environment. This paper demonstrates that Pelaez et al.’s scheme does not withstand impersonation, session key disclosure and replay attacks. We also show that their scheme does not achieve secure mutual authentication and anonymity. Moreover, we propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to resolve these security weaknesses, considering computational costs.
1.1. Adversary Model
We present the Dolev–Yao (DY) model [
9] to evaluate security of ours and previous schemes, which is widely accepted as security threat model. The detailed description of the DY model is as below:
A malicious adversary can modify, intercept, delete or insert the transmitted messages via an open channel. A malicious adversary can obtain or steal the smart card of legitimate user and can extract the data stored in the smart card by using power-analysis [
4].
A malicious adversary can perform various attacks such as man-in-the-middle (MITM), replay, impersonation, and session key disclosure attack [
10,
11].
1.2. Our Contributions
Our contributions in this paper are as follows.
We demonstrate that Pelaez et al.’s scheme is not secure against various attacks such as impersonation, session key disclosure and replay attacks and does not achieve secure mutual authentication and anonymity.
We propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to address the security shortcomings of Pelaez et al.’s scheme. The proposed scheme withstands impersonation, session key disclosure, and replay attacks and achieve secure mutual authentication and anonymity. Moreover, the proposed scheme is more efficient than Pelaez et al.’s scheme because it utilizes only bitwise exclusive or (XOR) and hash operations.
We prove that the proposed scheme provides secure mutual authentication using the Burrows–Abadi–Needham (BAN) logic [
12] and perform an informal security analysis to prove that our scheme is secure against various attacks such as MITM, impersonation, replay and session key disclosure attacks. Furthermore, we compare the security properties and performance of proposed protocol with other related schemes.
We perform a formal security analysis using the automated validation of internet security protocols and applications (AVISPA) simulation tool to prove that the proposed protocol resists the MITM and replay attacks.
1.3. Organization
We introduce the related works and review Pelaez et al.’s scheme in
Section 2 and
Section 3. In
Section 4 and
Section 5, we cryptanalyze Pelaez et al.’s scheme and propose a lightweight IoT-based three-factor authentication scheme in cloud computing environment to enhance the security shortcomings of Pelaez et al.’s scheme.
Section 6 and
Section 7 prove the security of proposed scheme and present the simulation analysis using AVISPA. In
Section 8, we compare the security properties and performances of proposed protocol with other related schemes. Finally,
Section 9 concludes the paper.
2. Related Works
In last few decades, numerous authentication and key agreement schemes have been proposed to ensure privacy of user, considering resource-constrained environments such as wireless sensor networks, global mobility networks and vehicular networks [
3,
13,
14,
15,
16,
17,
18,
19]. In 1981, Lamport [
3] firstly proposed a lightweight password based user authentication scheme to provide secure communication. However, Lamport’s scheme has low security level because its security only relies on passwords. In 2002, Chien et al. [
13] presented a two-factor user authentication protocol using smart card and password to resolve this problem. Unfortunately, the two-factor authentication schemes using password and smart cards cannot ensure user’s privacy [
13,
14,
15,
16,
17,
18,
19], when the data stored in token (e.g., smart card, mobile device, etc.) are compromised.
Later, several authentication and key agreement schemes for IoT have been presented in various fields [
20,
21,
22]. However, these environments are not suitable for IoT because it cannot handle a large number of data. In 2019, Zhou et al. [
23] presented a lightweight IoT-based authentication scheme in cloud computing environment to overcome this issue. Zhou et al. claimed that their scheme can prevent various attacks such as insider, forgery and tracking attacks and provide secure mutual authentication and session key security. However, in 2019, Pelaez et al. [
8] pointed out that Zhou et al.’s scheme [
23] cannot withstand insider, off-line guessing and session key disclosure attacks and provide secure mutual authentication. To resolve these security problems, Pelaez et al. [
8] presented a lightweight IoT-based authentication scheme in cloud computing environment. They also claimed that their scheme is secure against off-line password guessing, insider, impersonation and replay attacks.
3. Review of Pelaez et al.’s Scheme
We briefly review Pelaez et al.’s IoT based authentication scheme in cloud computing environment. Their scheme comprises of three processes: registration, authentication, and password change. These processes are presented as below (for details, see [
8]).
3.1. User Registration Process
In Pelaez et al.’s scheme, a new user
is registered from control server
via a secure channel.
Figure 1 shows the user registration process of Pelaez et al.’s scheme. In
Figure 1,
sends the registration request to
and then
issues the smart cards.
3.2. Cloud Server Registration Process
In Pelaez et al.’s scheme, a cloud server
is registered from control server
via a secure channel.
Figure 2 shows the cloud server registration process of the Pelaez et al.’s scheme. In
Figure 2,
sends the registration request to
and then
sends parameters
and
to
.
3.3. Login Process
When
wants to access the service,
firstly sends login request message to
. In
Figure 3,
sends login request messages
to
, and then
sends the messages
to
in order to check validation of
.
3.4. Authentication Process
After finishing the login process,
,
and
perform mutual authentication with each entity, and then
and
can share the session key
.
Figure 4 shows the authentication process of the Pelaez et al.’s scheme.
4. Cryptanalysis of Pelaez et al.’s Scheme
In this section, we demonstrate that Pelaez et al.’s scheme does not resist replay, session key disclosure and impersonation attacks and show that their scheme does not achieve secure mutual authentication and anonymity.
4.1. Impersonation Attack
The impersonation attack is that a malicious adversary try to impersonate as a legitimate user. When a malicious adversary
may attempt to impersonate a legal user,
can easily generate the login request message of
. According to
Section 1.1,
can obtain smart card of
and can extract the data
stored in smart card. Furthermore,
intercepts the message transmitted via an open channel. Finally,
performs the impersonation attack as below:
- Step 1:
A malicious adversary can compute real identity of legitimate user and . Then, generates timestamp and random nonce , computes , and sends to the .
- Step 2:
Upon getting the message from , the generates random nonces and and computes , and . Then, the sends to the .
- Step 3:
Upon getting the message from , the computes , and . Then, the checks whether . If it is valid, the authenticates . Then, the computes . After that, the computes and . Then, the checks whether . If it is valid, the authenticate . After that, the recovers . Then, the computes and checks whether . If it is valid, the have evidence of the connection attempt between and . To key agreement and mutual authentication, the generates a random nonce and computes the session key . Then, the computes , , , , and . Finally, the sends to the .
- Step 4:
Upon getting the message from , the computes , , and decrypts . After that, the sends to the .
- Step 5:
Upon getting the messages from , the computes , , and decrypts . For mutual authentication with , the computes and sends to the .
- Step 6:
Upon getting the messages from , the computes and checks whether . Finally, the computes and sends to the .
- Step 7:
Upon getting the messages from , the computes = and checks whether .
can successfully generates the login request message and session key between and . As a result, we show that Pelaez et al.’s scheme cannot withstand impersonation attack.
4.2. Session Key Disclosure Attack
The session key disclosure attack is that a malicious adversary can obtain the session key between
and
. Pelaez et al. claimed that their scheme can ensure security of session key because a malicious adversary cannot obtain random nonce
,
,
and current timestamp
. However, according to
Section 1.1, a malicious adversary
can extract the data
stored in the smart card and can obtain the transmitted messages
via an open channel. Therefore, a malicious adversary
can easily compute session key
.
4.3. Replay Attack
Replay attack is that a malicious adversary try to obtain sensitive messages of user using the messages transmitted in previous and current session. Pelaez et al. claimed that their scheme can resist replay attack because a malicious adversary cannot obtain random nonce and timestamp. However, can calculate the random nonce and timestamp of legitimate user correctly. According to 4.1, also impersonates a legitimate user . Therefore, can obtain , and and timestamp and . As a result, Pelaez et al.’s scheme does not withstand replay attack.
4.4. Mutual Authentication
Pelaez et al claimed that their protocol allows secure mutual authentication among the user
, the cloud server
, and the control server
. However, according to
Section 3.1, their protocol does not withstand to impersonation attack, as a malicious adversary
can successfully generate authentication request message
. Therefore, Pelaez et al.’s scheme does not achieve secure mutual authentication.
4.5. Anonymity
Pelaez et al claimed that a malicious adversary
cannot obtain the real identity
of legitimate user. However, according to
Section 1.1, a malicious adversary
can extract the secret parameter
stored in the smart card and can intercept the transmitted message
via an open channel.
can also compute
and easily obtain real identity of legitimate user
. Therefore, Pelaez et al.’s scheme does not guarantee anonymity.
5. Proposed Scheme
In this section, we propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to enhance security drawbacks of Pelaez et al.’s scheme. The proposed scheme consists of three processes: registration, login and authentication, and password change. The details of each process are presented below.
5.1. User Registration Process
A new user
who requests the use of the IoT services must register with control server
.
Figure 5 shows the user registration process of proposed scheme and the detailed processes are as below.
- Step 1:
The selects and and imprints biometric . After that, computes =, and sends messages to control server via a secure channel.
- Step 2:
After getting the messages from , the generates a random nonce and computes , , , and . Then, the stores , in a database and smart card, respectively. The sends and issues smart card to via a secure channel.
- Step 3:
After getting the message and smart card from , the computes and stores in a smart card .
5.2. Cloud Server Registration Process
A cloud server
must register with the control server
to provide IoT service to the users.
Figure 6 shows the cloud server registration process of proposed scheme and the detailed processes are as below.
- Step 1:
The cloud server selects and generates a random nonce . After that, the sends messages to the via a secure channel.
- Step 2:
After getting the messages, the generates a random nonce and computes and . Then, the stores in a database and sends messages to the via a secure channel.
- Step 3:
After getting the messages, the stores in a database.
5.3. Login and Authentication Process
A user
who requests access to IoT service must send a login request message to the
.
Figure 7 shows the login and authentication process of the proposed scheme. The detailed process is as below.
- Step 1:
The inputs , and imprints biometric . Then, the calculates , , , and . The checks whether . If it is correct, the generates a random nonce . After that, the computes , and and sends login request messages to the via an open channel.
- Step 2:
Upon getting the messages from the , the generates a random nonce and computes , and . Then, the sends the messages to the via an open channel.
- Step 3:
Upon getting the messages from the , the computes , , , and and checks whether . If it is correct, the computes , , , and and checks whether . If it is valid, the computes , and . Then, the updates to and replaces with . Finally, the sends messages to the .
- Step 4:
Upon getting the messages from the , the computes and and checks whether . If it is valid, the computes and and sends messages to the .
- Step 5:
Upon getting the messages from the , the computes , and and checks whether . If it is correct, the computes and to . After that, the smart card updates ) and and replaces with . As a result, the , and achieve the mutual authentication successfully.
5.4. Password Change Process
When
wants to update his/her password, the
can freely update their password in the proposed scheme.
Figure 8 shows the password change process of the proposed scheme. The detailed process is as below.
- Step 1:
The chooses , and imprints biometrics . Then, the calculates =, and sends to the smart card .
- Step 2:
After getting the message from , the computes and and checks whether . If it is equal, the sends the authentication message to the .
- Step 3:
Upon getting the message from the , the inputs a new password and imprints a new biometrics . computes =, and sends to the .
- Step 4:
Upon getting the message from the , the computes , and replaces with .
6. Security Analysis
To assess secure mutual authentication of the proposed scheme, we utilize the BAN logic, which is widely accepted formal security model. Furthermore, we perform an informal security analysis to assess the safety of proposed scheme against various types of attacks.
6.1. Informal Security Analysis
The security of the proposed scheme is accessed utilizing an informal security analysis. Our scheme can withstand against various types of attacks, including impersonation, replay, session key disclosure attacks, and allows secure mutual authentication and anonymity.
6.1.1. Impersonation Attack
When a malicious adversary may attempt to impersonate a legitimate user, must generate a login request message correctly. However, cannot compute it because cannot obtain ’s random nonce , real identity , and secret parameter . Therefore, our scheme is secure against the impersonation attack because cannot calculate a login request message successfully.
6.1.2. Replay Attack
If a malicious adversary may attempt to impersonate legal user by resending messages transmitted in a previous session, cannot utilize the previous messages because the checks whether and , respectively. Furthermore, our scheme can withstand replay attack by using dynamic random nonce and that are changed every session. Therefore, our scheme protects against replay attack.
6.1.3. Session Key Disclosure Attack
In our scheme, a malicious adversary cannot compute session key because cannot obtain random nonce and . In addition, cannot obtain random nonce and without secret parameter and . Consequently, our scheme withstands the session key disclosure attack.
6.1.4. Smart card Stolen Attack
According to
Section 1.1, we suppose that a
can obtain a smart card and extract the data
stored in the smart card. However, the
cannot obtain sensitive information
and
of legitimate user because the data stored in the smart card are protected
,
and
by using a hash function and XOR operation.
6.1.5. Mutual Authentication
In our scheme, after getting the request message from the , the control server checks whether . If it is correct, authenticates . After getting the messages from cloud server , the checks whether . If it is equal, authenticates . After getting the messages from the , the checks whether . If it is correct, authenticates . After getting the messages from the , the checks whether . Finally, the authenticates . As a result, our scheme achieve secure mutual authentication among , , and because a malicious adversary does not know secret parameters and .
6.1.6. Anonymity
A malicious adversary cannot obtain the real identity of legitimate user because it is masked by using hash function and XOR operation such as . In addition, the cannot obtain secret parameter and random nonce . Consequently, our scheme provides anonymity.
6.2. Security Features
We shows the better security levels achieved by the proposed scheme compared with some existing schemes [
8,
23,
24,
25]. The existing schemes are insecure against various attacks, including impersonation, session key disclosure smart card stolen, and replay attacks and cannot provide mutual authentication and anonymity.
Table 1 shows the analysis results of the security features.
6.3. BAN Logic Based Authentication Proof
We performed security analysis utilizing the BAN logic to demonstrate the secure mutual authentication of the proposed scheme. We present the BAN logic notations in
Table 2. Furthermore, we define the rules, the goals, the idealized form, and the assumptions for BAN logic analysis. We prove that the proposed scheme provides secure mutual authentication among
,
and
.
6.3.1. BAN Logic Rules
The rules of BAN logic are as below.
6.3.2. Goals
To assess the BAN logic proof, we present the goals of the proposed scheme as below.
- Goal 1:
- Goal 2:
- Goal 3:
- Goal 4:
6.3.3. Idealized Forms
To assess the BAN logic proof, we define the assumptions of the proposed scheme as below.
- Msg1:
:
- Msg2:
:
- Msg3:
:
- Msg4:
:
6.3.4. Assumptions
We present the initial assumptions to assess the BAN logic proof.
- A1:
- A2:
- A3:
- A4:
- A5:
- A6:
- A7:
- A8:
- A9:
- A10:
6.3.5. Proof Using BAN Logic
The proof then proceeds as below.
- Step 1:
According to
, we could get
- Step 2:
Using the message meaning rule with
and
, we get
- Step 3:
From the freshness rule with
and
, we obtain
- Step 4:
Using the nonce verification with
and
, we get
- Step 5:
From the belief rule with
, we obtain
- Step 6:
According to
, we could get
- Step 7:
Using the message meaning rule with
and
, we get
- Step 8:
From the freshness rule with
and
, we obtain
- Step 9:
Using the nonce verification rule with
and
, we get
- Step 10:
According to
, we could get
- Step 11:
Using the message meaning rule with
and
, we get
- Step 12:
From the freshness rule with
and
, we obtain
- Step 13:
Using the nonce verification rule with
and
, we get
- Step 14:
According to
, we could get
- Step 15:
Using the message meaning rule with
and
, we get
- Step 16:
From the freshness rule with
and
, we obtain
- Step 17:
Using the nonce verification with
and
, we get
- Step 18:
From the belief rule with
, we obtain
- Step 19:
Using the jurisdiction rule with
and
, we get
- Step 20:
Because of
, from the
,
,
and
we could get
- Step 21:
Using the jurisdiction rule with
and
, we obtain
Referring to Goals 1–4, we show that proposed scheme achieves secure mutual authentication among , and .
7. Simulation for Security Verification with the AVISPA tool
We performed a formal security verification of the proposed scheme utilizing AVISPA simulation tool [
26,
27] to evaluate the safety of the authentication protocol against MITM and replay attacks, which is widely accepted for formal security analysis [
28,
29,
30,
31]. To perform AVISPA simulation tool, the environment and the session of security protocol must be implemented using the High Level Protocols Specification Language (HLPSL).
7.1. HLPSL Specifications
We considered three basic roles: user
, cloud server
, and control server
. Then, we present
and
utilizing HLPSL in
Figure 9, which contains the security goals. The role specifications of
,
, and
are as shown in
Figure 10,
Figure 11 and
Figure 12.
The receives the initial message and updates the updates the state value from 0 to 1. The then sends the registration request messages to the via a secure channel and receives from the . The updates the state value from 1 to 2. In the login and authentication phase, the declares from the , and then updates the state value from 2 to 3. Finally, the receives the authentication messages from the . The checks whether . If it is valid, the authenticates the successfully. The role specification for is similarly defined.
7.2. AVISPA Simulation Result
We show the AVISPA results to verify the safety of the proposed scheme using OFMC and CL-AtSe. The OFMC checks whether the proposed scheme is safe from MITM attack. In addition, the CL-AtSe demonstrates the safety of the protocol against replay attack. Consequently,
Figure 13 shows that the proposed scheme is secure against MITM and replay attacks though AVISPA simulation.
8. Performance Analysis
We compared the computation cost, communication cost and security features of the proposed scheme with some existing schemes [
8,
23,
24,
25]. We show that the proposed scheme provides better efficiency and security features.
8.1. Computation Cost
We compared the computation overheads of the proposed scheme with some existing schemes [
8,
23,
24,
25]. To analyze of computation cost, we estimated using the following parameters.
Table 3 shows the analysis results of computation cost and the detailed total cost are as below.
The total computation cost for the proposed scheme and Pelaez et al.’s scheme are 34 and 48 + 8, respectively. We provide better efficiency than some existing schemes because the proposed scheme uses only hash and XOR operations. Therefore, our scheme is secure and efficient for practical IoT-based cloud computing environment.
8.2. Communication Cost
We compared the communication overhead of the proposed scheme with some existing schemes [
8,
23,
24,
25]. In authentication phase of the proposed scheme, the transmitted messages
,
,
and
require (128 + 128 + 128 + 128 = 512 bits), (128 + 128 + 128 + 128 + 128 + 128 + 128 + 128 = 1024 bits), (128 + 128 + 128 = 384 bits), and (128 + 128 = 256 bits), respectively.
Table 4 shows the analysis results of communication cost. Consequently, the proposed scheme is thus more efficient than other related schemes [
8,
23,
24,
25] because the total communications cost are 2176 bits (Case 1) and 4352 bits (Case 2).
Case 1 defines that the pseudo-identity, random nonce, timestamp, identity, password, and hash function are 128 bits, respectively.
Case 2 defines that the pseudo-identity, random nonce, timestamp, identity, password, and hash function are 256 bits, respectively.
The block length for symmetric encryption is 128 bits.
9. Conclusions
This paper shows that Pelaez et al.’s scheme does not defend various attacks such as impersonation, session key disclosure and replay attacks. Furthermore, we show that Pelaez et al.’s scheme cannot allow mutual authentication and anonymity. We propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to enhance the security drawbacks of Pelaez et al.’s scheme. Our scheme can withstand various types of attacks, including impersonation, session key disclosure and replay attacks, and can provide mutual authentication and anonymity. Then, we demonstrate that our scheme allows secure mutual authentication among , , and utilizing BAN logic analysis. We also performed a formal security verification analysis of the proposed scheme utilizing the AVISPA simulation tool. In addition, we compared the security features and performance of the proposed scheme with some existing schemes. We show that our scheme provides better safety and efficiency than related schemes. Therefore, our scheme can be suitable for practical IoT-based cloud computing environment because it is more secure and lightweight than the previous schemes.
Author Contributions
Conceptualization, S.Y.; software, S.Y. and K.P.; validation, K.P.; formal analysis, K.P.; writing—original draft preparation, S.Y.; writing—review and editing, K.P. and Y.P.; supervision, Y.P.
Funding
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science, ICT and Future Planning under Grant 2017R1A2B1002147 and in part by the BK21 Plus project funded by the Ministry of Education, Korea under Grant 21A20131600011.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Effectively and Securely Using the Cloud Computing Paradigm (v0.25). Available online: http://csrc.nist.gov/groups/SNS/cloud-computing (accessed on 5 August 2019).
- Grobauer, B.; Walloscheck, T.; Stocker, E. Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 2011, 9, 50–57. [Google Scholar] [CrossRef]
- Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology; Springer: Berlin, Germany, 1999; pp. 388–397. [Google Scholar]
- Amin, R.; Islam, S.K.; Biswas, G.P.; Khan, M.K.; Leng, L.; Kumar, N. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 2016, 101, 42–62. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Wu, F.; Choo, K.K.R. A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener. Comput. Syst. 2018, 83, 607–618. [Google Scholar] [CrossRef]
- Pelaez, R.M.; Cruz, H.T.; Michel, J.R.; Garcia, V.; Mena, L.J.; Felix, V.G.; Brust, A.O. An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 2019, 19, 2098. [Google Scholar] [CrossRef] [PubMed]
- Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Park, Y.; Park, K.; Park, Y. Secure user authentication scheme with novel server mutual verification for multiserver environments. J. Commun. Syst. 2019, 32, 1–17. [Google Scholar] [CrossRef]
- Park, K.; Park, Y.; Das, A.K.; Yu, S.; Lee, J.; Park, Y.H. A dynamic privacy-preserving key management protocol for V2G in social internet of things. IEEE Access 2019, 7, 76812–76832. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Chien, H.Y.; Jan, J.; Tseng, Y.M. An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 2002, 21, 372–375. [Google Scholar] [CrossRef]
- Zhu, J.; Ma, J. A new authentication scheme with anonymity for wireless environments. IEEE Trans. Cons. Elec. 2004, 50, 231–235. [Google Scholar]
- Lee, Y.; Kim, S.; Won, D. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 2010, 36, 213–223. [Google Scholar] [CrossRef]
- Kim, J.; Lee, D.; Jeon, D.; Lee, Y.; Won, D. Security anaylsis and improvements two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 2014, 14, 6443–6462. [Google Scholar] [CrossRef] [PubMed]
- Wang, D.; Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor networks. Comput. Netw. 2014, 73, 41–57. [Google Scholar] [CrossRef]
- Wang, D.; Li, W.; Wang, P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Indust. Inform. 2018, 14, 4081–4092. [Google Scholar] [CrossRef]
- Wong, K.H.; Zheng, Y.; Cao, J.; Wang, S. A dynamic user authentication scheme for wireless sensor networks. IEEE Inter. Conf. Sensor Netw. Ubiq. Trustworthy Comp. 2006, 1, 1–8. [Google Scholar]
- Li, X.; Peng, J.; Niu, J.; Wu, F.; Liao, J.; Choo, K.K.R. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J. 2018, 5, 1606–1615. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Wu, F.; Sangaiah, A.; Choo, K.K.R. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comp. Appl. 2018, 103, 194–204. [Google Scholar] [CrossRef]
- Lee, J.; Yu, S.; Park, K.; Park, Y.; Park, Y. Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 2019, 19, 2358. [Google Scholar] [CrossRef]
- Zhou, L.; Li, X.; Yeh, K.H.; Su, C.; Chiu, W. Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 2019, 91, 244–251. [Google Scholar] [CrossRef]
- Xue, K.; Hong, P.; Ma, C.A. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 2014, 80, 195–206. [Google Scholar] [CrossRef]
- Amin, R.; Kumar, N.; Biswas, G.P.; Iqbal, R.; Chang, V. A lightweight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 2018, 78, 1005–1019. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://www.avispa-project.org/ (accessed on 6 May 2019).
- SPAN: A Security Protocol Animator for AVISPA. Available online: http://www.avispa-project.org/ (accessed on 6 May 2019).
- Park, K.; Park, Y.; Park, Y.; Reddy, A.G.; Das, A.K. Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 2017, 5, 25110–25125. [Google Scholar] [CrossRef]
- Park, K.; Park, Y.; Park, Y.; Das, A.K. 2PAKEP: Provably secure and efficient two-party authenticated key exchange protocol for mobile environment. IEEE Access 2018, 6, 30225–30241. [Google Scholar] [CrossRef]
- Yu, S.; Lee, J.; Lee, K.; Park, K.; Park, Y. Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors 2018, 18, 3191. [Google Scholar] [CrossRef] [PubMed]
- Park, Y.; Park, Y. Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 2016, 16, 2123. [Google Scholar] [CrossRef] [PubMed]
- Wu, F.; Xu, L.; Kumari, S.; Li, X.; Shen, J.; Choo, K.K.R.; Wazid, M.; Das, A.K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 2017, 89, 72–85. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).