Next Article in Journal
Stationary Distribution and Extinction in a Stochastic SIQR Epidemic Model Incorporating Media Coverage and Markovian Switching
Next Article in Special Issue
Different Object Functions for SWIPT Optimization by SADDE and APSO
Previous Article in Journal
Novel Method to Analytically Obtain the Asymptotic Stable Equilibria States of Extended SIR-Type Epidemiological Models
 
 
Article

A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments

1
Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 40401, Taiwan
2
Department of Information Communications, Chinese Culture University, Taipei 11114, Taiwan
*
Author to whom correspondence should be addressed.
Academic Editors: Teen-Hang Meen, Charles Tijus and Jih-Fu Tu
Symmetry 2021, 13(7), 1121; https://doi.org/10.3390/sym13071121
Received: 8 June 2021 / Revised: 19 June 2021 / Accepted: 21 June 2021 / Published: 23 June 2021
(This article belongs to the Special Issue Selected Papers from IIKII 2021 Conferences)
Internet of Things (IoT) is composed of various kinds of devices such as cars, electrical appliances, machines and sensors. With IoT technologies, devices can exchange information through the network, people are allowed to get information collected by devices without interacting with them, and automatic operations for devices are realized. Because of the variety of IoT devices, some of them possess limited computational capability. On the other hand, data transmission in IoT networks is usually through a public channel. To ensure efficiency and security for IoT environments, Lee et al. proposed a three-factor authentication scheme with hash function and XOR operation. They claimed their scheme possessed superior properties and could resist common attacks. After analyzing their scheme, we find that their scheme is vulnerable to five flaws. In this paper, how these found flaws threaten Lee et al.’s scheme is shown in detail. Then, we propose an improvement to overcome the found flaws and preserve the advantages by employing ECC. View Full-Text
Keywords: Internet of Things (IoT); authentication; replay attack; denial-of-service attack; user untraceability; elliptic curve cryptography (ECC) Internet of Things (IoT); authentication; replay attack; denial-of-service attack; user untraceability; elliptic curve cryptography (ECC)
Show Figures

Figure 1

MDPI and ACS Style

Chang, Y.-F.; Tai, W.-L.; Hou, P.-L.; Lai, K.-Y. A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments. Symmetry 2021, 13, 1121. https://doi.org/10.3390/sym13071121

AMA Style

Chang Y-F, Tai W-L, Hou P-L, Lai K-Y. A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments. Symmetry. 2021; 13(7):1121. https://doi.org/10.3390/sym13071121

Chicago/Turabian Style

Chang, Ya-Fen, Wei-Liang Tai, Po-Lin Hou, and Kuan-Yu Lai. 2021. "A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments" Symmetry 13, no. 7: 1121. https://doi.org/10.3390/sym13071121

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop