Next Article in Journal
3D Printed Personalized Corneal Models as a Tool for Improving Patient’s Knowledge of an Asymmetric Disease
Previous Article in Journal
Multidimensional Interpolation Decoupling Strategy for CD Basis Weight of Papermaking Process
Previous Article in Special Issue
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things
Open AccessArticle

A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment

College of Computer Science and Technology, Jilin University, Chaoyang District, Changchun 130012, Jilin, China
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(1), 150; https://doi.org/10.3390/sym12010150
Received: 25 December 2019 / Revised: 6 January 2020 / Accepted: 8 January 2020 / Published: 10 January 2020
The integration of Internet of things (IoT) and cloud computing technology has made our life more convenient in recent years. Cooperating with cloud computing, Internet of things can provide more efficient and practical services. People can accept IoT services via cloud servers anytime and anywhere in the IoT-based cloud computing environment. However, plenty of possible network attacks threaten the security of users and cloud servers. To implement effective access control and secure communication in the IoT-based cloud computing environment, identity authentication is essential. In 2016, He et al. put forward an anonymous authentication scheme, which is based on asymmetric cryptography. It is claimed that their scheme is capable of withstanding all kinds of known attacks and has good performance. However, their scheme has serious security weaknesses according to our cryptanalysis. The scheme is vulnerable to insider attack and DoS attack. For overcoming these weaknesses, we present an improved authentication and key agreement scheme for IoT-based cloud computing environment. The automated security verification (ProVerif), BAN-logic verification, and informal security analysis were performed. The results show that our proposed scheme is secure and can effectively resist all kinds of known attacks. Furthermore, compared with the original scheme in terms of security features and performance, our proposed scheme is feasible. View Full-Text
Keywords: authentication; internet of things; cloud computing; adversary model; security analysis authentication; internet of things; cloud computing; adversary model; security analysis
Show Figures

Figure 1

MDPI and ACS Style

Yu, Y.; Hu, L.; Chu, J. A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment. Symmetry 2020, 12, 150.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop