Abstract
With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments, including smart home, smart factory, and smart healthcare. However, a user is insecure various types of attacks, because sensitive information is often transmitted via an open channel. Therefore, secure authentication schemes are essential to provide IoT services for legal users. In 2019, Pelaez et al. presented a lightweight IoT-based authentication scheme in cloud computing environment. However, we prove that Pelaez et al.’s scheme cannot prevent various types of attacks such as impersonation, session key disclosure, and replay attacks and cannot provide mutual authentication and anonymity. In this paper, we present a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to resolve these security problems. The proposed scheme can withstand various attacks and provide secure mutual authentication and anonymity by utilizing secret parameters and biometric. We also show that our scheme achieves secure mutual authentication using Burrows–Abadi–Needham logic analysis. Furthermore, we demonstrate that our scheme resists replay and man-in-the-middle attacks usingthe automated validation of internet security protocols and applications (AVISPA) simulation tool. Finally, we compare the performance and the security features of the proposed scheme with some existing schemes. Consequently, we provide better safety and efficiency than related schemes and the proposed scheme is suitable for practical IoT-based cloud computing environment.
1. Introduction
With the recent advances in wireless sensor networks and embedded technologies, internet of things (IoT) connects objects and shares various useful data with internet through resource-constrained devices to provide convenient services for users such as smart home, healthcare, vehicle to everything and smart gird. However, a single server environment also is inefficient for IoT because an ocean of data is generated by resource-constrained devices such as microsensor, RFID tag and smart cards.
Cloud computing is a distributed computing mechanism for a large-scale data and allows sharing resources among all of the servers and users. The cloud computing provides five essential characteristics: on-demand self-services, ubiquitous network access, rapid elasticity, measured service and resource pooling [1,2]. On-demand self-service handles cloud services without human interaction and ubiquitous network access controls access service using standard protocols. Rapid elasticity and measured service optimize the resource usage. Resource pooling provides cloud service using homogeneous infrastructure among service users. The cloud computing deals with an ocean of data generated by devices and sensors and provides data managing service for users through these essential characteristics.
However, these services are vulnerable to potential attacks by malicious adversaries because they are provided through an open channel, including sensitive data of legitimate user about location, health, payment, etc. Therefore, a secure and efficient authentication for IoT environment has become essential security requirements to provide useful services to user.
In 1981, Lamport [3] proposed one factor user authentication scheme using passwords to ensure user’s privacy. However, security of the password based authentication scheme is easily broken because its security only relies on the passwords. In 2002, Chien et al. proposed two factor authentication scheme to overcome this security flaw using password and smart cards. However, their scheme is vulnerable to smart card stolen attack as the data stored in smart cards can be extracted by power analysis attacks [4]. When a malicious adversary obtains smart cards and password, they can perform various attacks such as impersonation, replay and insider attacks. To overcome the above-mentioned security weaknesses, three-factor authentication schemes have been proposed [5,6,7]. Biometrics (e.g., face, retina, fingerprint, iris, etc.) have several important characteristics: they cannot be lost or forgotten; they are hard to forge, copy, share or distribute; and they are difficult to guess.
In 2019, Pelaez et al. [8] demonstrated that the previous scheme is vulnerable to insider, off-line guessing and disclosure attacks and proposed enhanced IoT-based authentication scheme in cloud computing environment. This paper demonstrates that Pelaez et al.’s scheme does not withstand impersonation, session key disclosure and replay attacks. We also show that their scheme does not achieve secure mutual authentication and anonymity. Moreover, we propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to resolve these security weaknesses, considering computational costs.
1.1. Adversary Model
We present the Dolev–Yao (DY) model [9] to evaluate security of ours and previous schemes, which is widely accepted as security threat model. The detailed description of the DY model is as below:
- A malicious adversary can modify, intercept, delete or insert the transmitted messages via an open channel. A malicious adversary can obtain or steal the smart card of legitimate user and can extract the data stored in the smart card by using power-analysis [4].
- A malicious adversary can perform various attacks such as man-in-the-middle (MITM), replay, impersonation, and session key disclosure attack [10,11].
1.2. Our Contributions
Our contributions in this paper are as follows.
- We demonstrate that Pelaez et al.’s scheme is not secure against various attacks such as impersonation, session key disclosure and replay attacks and does not achieve secure mutual authentication and anonymity.
- We propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to address the security shortcomings of Pelaez et al.’s scheme. The proposed scheme withstands impersonation, session key disclosure, and replay attacks and achieve secure mutual authentication and anonymity. Moreover, the proposed scheme is more efficient than Pelaez et al.’s scheme because it utilizes only bitwise exclusive or (XOR) and hash operations.
- We prove that the proposed scheme provides secure mutual authentication using the Burrows–Abadi–Needham (BAN) logic [12] and perform an informal security analysis to prove that our scheme is secure against various attacks such as MITM, impersonation, replay and session key disclosure attacks. Furthermore, we compare the security properties and performance of proposed protocol with other related schemes.
- We perform a formal security analysis using the automated validation of internet security protocols and applications (AVISPA) simulation tool to prove that the proposed protocol resists the MITM and replay attacks.
1.3. Organization
We introduce the related works and review Pelaez et al.’s scheme in Section 2 and Section 3. In Section 4 and Section 5, we cryptanalyze Pelaez et al.’s scheme and propose a lightweight IoT-based three-factor authentication scheme in cloud computing environment to enhance the security shortcomings of Pelaez et al.’s scheme. Section 6 and Section 7 prove the security of proposed scheme and present the simulation analysis using AVISPA. In Section 8, we compare the security properties and performances of proposed protocol with other related schemes. Finally, Section 9 concludes the paper.
2. Related Works
In last few decades, numerous authentication and key agreement schemes have been proposed to ensure privacy of user, considering resource-constrained environments such as wireless sensor networks, global mobility networks and vehicular networks [3,13,14,15,16,17,18,19]. In 1981, Lamport [3] firstly proposed a lightweight password based user authentication scheme to provide secure communication. However, Lamport’s scheme has low security level because its security only relies on passwords. In 2002, Chien et al. [13] presented a two-factor user authentication protocol using smart card and password to resolve this problem. Unfortunately, the two-factor authentication schemes using password and smart cards cannot ensure user’s privacy [13,14,15,16,17,18,19], when the data stored in token (e.g., smart card, mobile device, etc.) are compromised.
Later, several authentication and key agreement schemes for IoT have been presented in various fields [20,21,22]. However, these environments are not suitable for IoT because it cannot handle a large number of data. In 2019, Zhou et al. [23] presented a lightweight IoT-based authentication scheme in cloud computing environment to overcome this issue. Zhou et al. claimed that their scheme can prevent various attacks such as insider, forgery and tracking attacks and provide secure mutual authentication and session key security. However, in 2019, Pelaez et al. [8] pointed out that Zhou et al.’s scheme [23] cannot withstand insider, off-line guessing and session key disclosure attacks and provide secure mutual authentication. To resolve these security problems, Pelaez et al. [8] presented a lightweight IoT-based authentication scheme in cloud computing environment. They also claimed that their scheme is secure against off-line password guessing, insider, impersonation and replay attacks.
3. Review of Pelaez et al.’s Scheme
We briefly review Pelaez et al.’s IoT based authentication scheme in cloud computing environment. Their scheme comprises of three processes: registration, authentication, and password change. These processes are presented as below (for details, see [8]).
3.1. User Registration Process
In Pelaez et al.’s scheme, a new user is registered from control server via a secure channel. Figure 1 shows the user registration process of Pelaez et al.’s scheme. In Figure 1, sends the registration request to and then issues the smart cards.
Figure 1.
User registration process of the Pelaez et al.’s scheme [8].
3.2. Cloud Server Registration Process
In Pelaez et al.’s scheme, a cloud server is registered from control server via a secure channel. Figure 2 shows the cloud server registration process of the Pelaez et al.’s scheme. In Figure 2, sends the registration request to and then sends parameters and to .
Figure 2.
Cloud server registration process of the Pelaez et al.’s scheme [8].
3.3. Login Process
When wants to access the service, firstly sends login request message to . In Figure 3, sends login request messages to , and then sends the messages to in order to check validation of .
Figure 3.
Login process of the Pelaez et al.’s scheme [8].
3.4. Authentication Process
After finishing the login process, , and perform mutual authentication with each entity, and then and can share the session key . Figure 4 shows the authentication process of the Pelaez et al.’s scheme.
Figure 4.
Authentication process of the Pelaez et al.’s scheme [8].
4. Cryptanalysis of Pelaez et al.’s Scheme
In this section, we demonstrate that Pelaez et al.’s scheme does not resist replay, session key disclosure and impersonation attacks and show that their scheme does not achieve secure mutual authentication and anonymity.
4.1. Impersonation Attack
The impersonation attack is that a malicious adversary try to impersonate as a legitimate user. When a malicious adversary may attempt to impersonate a legal user, can easily generate the login request message of . According to Section 1.1, can obtain smart card of and can extract the data stored in smart card. Furthermore, intercepts the message transmitted via an open channel. Finally, performs the impersonation attack as below:
- Step 1:
- A malicious adversary can compute real identity of legitimate user and . Then, generates timestamp and random nonce , computes , and sends to the .
- Step 2:
- Upon getting the message from , the generates random nonces and and computes , and . Then, the sends to the .
- Step 3:
- Upon getting the message from , the computes , and . Then, the checks whether . If it is valid, the authenticates . Then, the computes . After that, the computes and . Then, the checks whether . If it is valid, the authenticate . After that, the recovers . Then, the computes and checks whether . If it is valid, the have evidence of the connection attempt between and . To key agreement and mutual authentication, the generates a random nonce and computes the session key . Then, the computes , , , , and . Finally, the sends to the .
- Step 4:
- Upon getting the message from , the computes , , and decrypts . After that, the sends to the .
- Step 5:
- Upon getting the messages from , the computes , , and decrypts . For mutual authentication with , the computes and sends to the .
- Step 6:
- Upon getting the messages from , the computes and checks whether . Finally, the computes and sends to the .
- Step 7:
- Upon getting the messages from , the computes = and checks whether .
can successfully generates the login request message and session key between and . As a result, we show that Pelaez et al.’s scheme cannot withstand impersonation attack.
4.2. Session Key Disclosure Attack
The session key disclosure attack is that a malicious adversary can obtain the session key between and . Pelaez et al. claimed that their scheme can ensure security of session key because a malicious adversary cannot obtain random nonce , , and current timestamp . However, according to Section 1.1, a malicious adversary can extract the data stored in the smart card and can obtain the transmitted messages via an open channel. Therefore, a malicious adversary can easily compute session key .
4.3. Replay Attack
Replay attack is that a malicious adversary try to obtain sensitive messages of user using the messages transmitted in previous and current session. Pelaez et al. claimed that their scheme can resist replay attack because a malicious adversary cannot obtain random nonce and timestamp. However, can calculate the random nonce and timestamp of legitimate user correctly. According to 4.1, also impersonates a legitimate user . Therefore, can obtain , and and timestamp and . As a result, Pelaez et al.’s scheme does not withstand replay attack.
4.4. Mutual Authentication
Pelaez et al claimed that their protocol allows secure mutual authentication among the user , the cloud server , and the control server . However, according to Section 3.1, their protocol does not withstand to impersonation attack, as a malicious adversary can successfully generate authentication request message . Therefore, Pelaez et al.’s scheme does not achieve secure mutual authentication.
4.5. Anonymity
Pelaez et al claimed that a malicious adversary cannot obtain the real identity of legitimate user. However, according to Section 1.1, a malicious adversary can extract the secret parameter stored in the smart card and can intercept the transmitted message via an open channel. can also compute and easily obtain real identity of legitimate user . Therefore, Pelaez et al.’s scheme does not guarantee anonymity.
5. Proposed Scheme
In this section, we propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to enhance security drawbacks of Pelaez et al.’s scheme. The proposed scheme consists of three processes: registration, login and authentication, and password change. The details of each process are presented below.
5.1. User Registration Process
A new user who requests the use of the IoT services must register with control server . Figure 5 shows the user registration process of proposed scheme and the detailed processes are as below.
Figure 5.
User registration process of the proposed scheme.
- Step 1:
- The selects and and imprints biometric . After that, computes =, and sends messages to control server via a secure channel.
- Step 2:
- After getting the messages from , the generates a random nonce and computes , , , and . Then, the stores , in a database and smart card, respectively. The sends and issues smart card to via a secure channel.
- Step 3:
- After getting the message and smart card from , the computes and stores in a smart card .
5.2. Cloud Server Registration Process
A cloud server must register with the control server to provide IoT service to the users. Figure 6 shows the cloud server registration process of proposed scheme and the detailed processes are as below.
Figure 6.
Cloud server registration process of the proposed scheme.
- Step 1:
- The cloud server selects and generates a random nonce . After that, the sends messages to the via a secure channel.
- Step 2:
- After getting the messages, the generates a random nonce and computes and . Then, the stores in a database and sends messages to the via a secure channel.
- Step 3:
- After getting the messages, the stores in a database.
5.3. Login and Authentication Process
A user who requests access to IoT service must send a login request message to the . Figure 7 shows the login and authentication process of the proposed scheme. The detailed process is as below.
Figure 7.
Login and authentication process of the proposed scheme.
- Step 1:
- The inputs , and imprints biometric . Then, the calculates , , , and . The checks whether . If it is correct, the generates a random nonce . After that, the computes , and and sends login request messages to the via an open channel.
- Step 2:
- Upon getting the messages from the , the generates a random nonce and computes , and . Then, the sends the messages to the via an open channel.
- Step 3:
- Upon getting the messages from the , the computes , , , and and checks whether . If it is correct, the computes , , , and and checks whether . If it is valid, the computes , and . Then, the updates to and replaces with . Finally, the sends messages to the .
- Step 4:
- Upon getting the messages from the , the computes and and checks whether . If it is valid, the computes and and sends messages to the .
- Step 5:
- Upon getting the messages from the , the computes , and and checks whether . If it is correct, the computes and to . After that, the smart card updates ) and and replaces with . As a result, the , and achieve the mutual authentication successfully.
5.4. Password Change Process
When wants to update his/her password, the can freely update their password in the proposed scheme. Figure 8 shows the password change process of the proposed scheme. The detailed process is as below.
Figure 8.
Password change process of the proposed scheme.
- Step 1:
- The chooses , and imprints biometrics . Then, the calculates =, and sends to the smart card .
- Step 2:
- After getting the message from , the computes and and checks whether . If it is equal, the sends the authentication message to the .
- Step 3:
- Upon getting the message from the , the inputs a new password and imprints a new biometrics . computes =, and sends to the .
- Step 4:
- Upon getting the message from the , the computes , and replaces with .
6. Security Analysis
To assess secure mutual authentication of the proposed scheme, we utilize the BAN logic, which is widely accepted formal security model. Furthermore, we perform an informal security analysis to assess the safety of proposed scheme against various types of attacks.
6.1. Informal Security Analysis
The security of the proposed scheme is accessed utilizing an informal security analysis. Our scheme can withstand against various types of attacks, including impersonation, replay, session key disclosure attacks, and allows secure mutual authentication and anonymity.
6.1.1. Impersonation Attack
When a malicious adversary may attempt to impersonate a legitimate user, must generate a login request message correctly. However, cannot compute it because cannot obtain ’s random nonce , real identity , and secret parameter . Therefore, our scheme is secure against the impersonation attack because cannot calculate a login request message successfully.
6.1.2. Replay Attack
If a malicious adversary may attempt to impersonate legal user by resending messages transmitted in a previous session, cannot utilize the previous messages because the checks whether and , respectively. Furthermore, our scheme can withstand replay attack by using dynamic random nonce and that are changed every session. Therefore, our scheme protects against replay attack.
6.1.3. Session Key Disclosure Attack
In our scheme, a malicious adversary cannot compute session key because cannot obtain random nonce and . In addition, cannot obtain random nonce and without secret parameter and . Consequently, our scheme withstands the session key disclosure attack.
6.1.4. Smart card Stolen Attack
According to Section 1.1, we suppose that a can obtain a smart card and extract the data stored in the smart card. However, the cannot obtain sensitive information and of legitimate user because the data stored in the smart card are protected , and by using a hash function and XOR operation.
6.1.5. Mutual Authentication
In our scheme, after getting the request message from the , the control server checks whether . If it is correct, authenticates . After getting the messages from cloud server , the checks whether . If it is equal, authenticates . After getting the messages from the , the checks whether . If it is correct, authenticates . After getting the messages from the , the checks whether . Finally, the authenticates . As a result, our scheme achieve secure mutual authentication among , , and because a malicious adversary does not know secret parameters and .
6.1.6. Anonymity
A malicious adversary cannot obtain the real identity of legitimate user because it is masked by using hash function and XOR operation such as . In addition, the cannot obtain secret parameter and random nonce . Consequently, our scheme provides anonymity.
6.2. Security Features
We shows the better security levels achieved by the proposed scheme compared with some existing schemes [8,23,24,25]. The existing schemes are insecure against various attacks, including impersonation, session key disclosure smart card stolen, and replay attacks and cannot provide mutual authentication and anonymity. Table 1 shows the analysis results of the security features.
Table 1.
Security features comparison.
6.3. BAN Logic Based Authentication Proof
We performed security analysis utilizing the BAN logic to demonstrate the secure mutual authentication of the proposed scheme. We present the BAN logic notations in Table 2. Furthermore, we define the rules, the goals, the idealized form, and the assumptions for BAN logic analysis. We prove that the proposed scheme provides secure mutual authentication among , and .
Table 2.
Notations for BAN logic.
6.3.1. BAN Logic Rules
The rules of BAN logic are as below.
- Message meaning rule:
- Nonce verification rule:
- Jurisdiction rule:
- Freshness rule:
- Belief rule:
6.3.2. Goals
To assess the BAN logic proof, we present the goals of the proposed scheme as below.
- Goal 1:
- Goal 2:
- Goal 3:
- Goal 4:
6.3.3. Idealized Forms
To assess the BAN logic proof, we define the assumptions of the proposed scheme as below.
- Msg1:
- :
- Msg2:
- :
- Msg3:
- :
- Msg4:
- :
6.3.4. Assumptions
We present the initial assumptions to assess the BAN logic proof.
- A1:
- A2:
- A3:
- A4:
- A5:
- A6:
- A7:
- A8:
- A9:
- A10:
6.3.5. Proof Using BAN Logic
The proof then proceeds as below.
- Step 1:
- According to , we could get
- Step 2:
- Using the message meaning rule with and , we get
- Step 3:
- From the freshness rule with and , we obtain
- Step 4:
- Using the nonce verification with and , we get
- Step 5:
- From the belief rule with , we obtain
- Step 6:
- According to , we could get
- Step 7:
- Using the message meaning rule with and , we get
- Step 8:
- From the freshness rule with and , we obtain
- Step 9:
- Using the nonce verification rule with and , we get
- Step 10:
- According to , we could get
- Step 11:
- Using the message meaning rule with and , we get
- Step 12:
- From the freshness rule with and , we obtain
- Step 13:
- Using the nonce verification rule with and , we get
- Step 14:
- According to , we could get
- Step 15:
- Using the message meaning rule with and , we get
- Step 16:
- From the freshness rule with and , we obtain
- Step 17:
- Using the nonce verification with and , we get
- Step 18:
- From the belief rule with , we obtain
- Step 19:
- Using the jurisdiction rule with and , we get
- Step 20:
- Because of , from the , , and we could get
- Step 21:
- Using the jurisdiction rule with and , we obtain
Referring to Goals 1–4, we show that proposed scheme achieves secure mutual authentication among , and .
7. Simulation for Security Verification with the AVISPA tool
We performed a formal security verification of the proposed scheme utilizing AVISPA simulation tool [26,27] to evaluate the safety of the authentication protocol against MITM and replay attacks, which is widely accepted for formal security analysis [28,29,30,31]. To perform AVISPA simulation tool, the environment and the session of security protocol must be implemented using the High Level Protocols Specification Language (HLPSL).
7.1. HLPSL Specifications
We considered three basic roles: user , cloud server , and control server . Then, we present and utilizing HLPSL in Figure 9, which contains the security goals. The role specifications of , , and are as shown in Figure 10, Figure 11 and Figure 12.
Figure 9.
Role for environment and session in HLPSL.
Figure 10.
Role specification for user .
Figure 11.
Role specification for cloud server .
Figure 12.
Role specification for control server .
The receives the initial message and updates the updates the state value from 0 to 1. The then sends the registration request messages to the via a secure channel and receives from the . The updates the state value from 1 to 2. In the login and authentication phase, the declares from the , and then updates the state value from 2 to 3. Finally, the receives the authentication messages from the . The checks whether . If it is valid, the authenticates the successfully. The role specification for is similarly defined.
7.2. AVISPA Simulation Result
We show the AVISPA results to verify the safety of the proposed scheme using OFMC and CL-AtSe. The OFMC checks whether the proposed scheme is safe from MITM attack. In addition, the CL-AtSe demonstrates the safety of the protocol against replay attack. Consequently, Figure 13 shows that the proposed scheme is secure against MITM and replay attacks though AVISPA simulation.
Figure 13.
Analysis of AVISPA simulation using OFMC and CL-AtSe.
8. Performance Analysis
We compared the computation cost, communication cost and security features of the proposed scheme with some existing schemes [8,23,24,25]. We show that the proposed scheme provides better efficiency and security features.
8.1. Computation Cost
We compared the computation overheads of the proposed scheme with some existing schemes [8,23,24,25]. To analyze of computation cost, we estimated using the following parameters. Table 3 shows the analysis results of computation cost and the detailed total cost are as below.
Table 3.
A comparative summary: computation costs.
The total computation cost for the proposed scheme and Pelaez et al.’s scheme are 34 and 48 + 8, respectively. We provide better efficiency than some existing schemes because the proposed scheme uses only hash and XOR operations. Therefore, our scheme is secure and efficient for practical IoT-based cloud computing environment.
- denotes the time for the hash function (Case 1 ms [23] and Case 2 ms [32]).
- denotes the time for the symmetric key cryptography operation using AES algorithm (case 1 ms [23] and Case 2 ms [32]).
- The XOR operation was not included because it is negligible compared to the other operations.
8.2. Communication Cost
We compared the communication overhead of the proposed scheme with some existing schemes [8,23,24,25]. In authentication phase of the proposed scheme, the transmitted messages , , and require (128 + 128 + 128 + 128 = 512 bits), (128 + 128 + 128 + 128 + 128 + 128 + 128 + 128 = 1024 bits), (128 + 128 + 128 = 384 bits), and (128 + 128 = 256 bits), respectively. Table 4 shows the analysis results of communication cost. Consequently, the proposed scheme is thus more efficient than other related schemes [8,23,24,25] because the total communications cost are 2176 bits (Case 1) and 4352 bits (Case 2).
Table 4.
A comparative summary: communication costs.
- Case 1 defines that the pseudo-identity, random nonce, timestamp, identity, password, and hash function are 128 bits, respectively.
- Case 2 defines that the pseudo-identity, random nonce, timestamp, identity, password, and hash function are 256 bits, respectively.
- The block length for symmetric encryption is 128 bits.
9. Conclusions
This paper shows that Pelaez et al.’s scheme does not defend various attacks such as impersonation, session key disclosure and replay attacks. Furthermore, we show that Pelaez et al.’s scheme cannot allow mutual authentication and anonymity. We propose a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to enhance the security drawbacks of Pelaez et al.’s scheme. Our scheme can withstand various types of attacks, including impersonation, session key disclosure and replay attacks, and can provide mutual authentication and anonymity. Then, we demonstrate that our scheme allows secure mutual authentication among , , and utilizing BAN logic analysis. We also performed a formal security verification analysis of the proposed scheme utilizing the AVISPA simulation tool. In addition, we compared the security features and performance of the proposed scheme with some existing schemes. We show that our scheme provides better safety and efficiency than related schemes. Therefore, our scheme can be suitable for practical IoT-based cloud computing environment because it is more secure and lightweight than the previous schemes.
Author Contributions
Conceptualization, S.Y.; software, S.Y. and K.P.; validation, K.P.; formal analysis, K.P.; writing—original draft preparation, S.Y.; writing—review and editing, K.P. and Y.P.; supervision, Y.P.
Funding
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science, ICT and Future Planning under Grant 2017R1A2B1002147 and in part by the BK21 Plus project funded by the Ministry of Education, Korea under Grant 21A20131600011.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Effectively and Securely Using the Cloud Computing Paradigm (v0.25). Available online: http://csrc.nist.gov/groups/SNS/cloud-computing (accessed on 5 August 2019).
- Grobauer, B.; Walloscheck, T.; Stocker, E. Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 2011, 9, 50–57. [Google Scholar] [CrossRef]
- Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology; Springer: Berlin, Germany, 1999; pp. 388–397. [Google Scholar]
- Amin, R.; Islam, S.K.; Biswas, G.P.; Khan, M.K.; Leng, L.; Kumar, N. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 2016, 101, 42–62. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Wu, F.; Choo, K.K.R. A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener. Comput. Syst. 2018, 83, 607–618. [Google Scholar] [CrossRef]
- Pelaez, R.M.; Cruz, H.T.; Michel, J.R.; Garcia, V.; Mena, L.J.; Felix, V.G.; Brust, A.O. An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 2019, 19, 2098. [Google Scholar] [CrossRef] [PubMed]
- Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Park, Y.; Park, K.; Park, Y. Secure user authentication scheme with novel server mutual verification for multiserver environments. J. Commun. Syst. 2019, 32, 1–17. [Google Scholar] [CrossRef]
- Park, K.; Park, Y.; Das, A.K.; Yu, S.; Lee, J.; Park, Y.H. A dynamic privacy-preserving key management protocol for V2G in social internet of things. IEEE Access 2019, 7, 76812–76832. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Chien, H.Y.; Jan, J.; Tseng, Y.M. An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 2002, 21, 372–375. [Google Scholar] [CrossRef]
- Zhu, J.; Ma, J. A new authentication scheme with anonymity for wireless environments. IEEE Trans. Cons. Elec. 2004, 50, 231–235. [Google Scholar]
- Lee, Y.; Kim, S.; Won, D. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 2010, 36, 213–223. [Google Scholar] [CrossRef]
- Kim, J.; Lee, D.; Jeon, D.; Lee, Y.; Won, D. Security anaylsis and improvements two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 2014, 14, 6443–6462. [Google Scholar] [CrossRef] [PubMed]
- Wang, D.; Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor networks. Comput. Netw. 2014, 73, 41–57. [Google Scholar] [CrossRef]
- Wang, D.; Li, W.; Wang, P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Indust. Inform. 2018, 14, 4081–4092. [Google Scholar] [CrossRef]
- Wong, K.H.; Zheng, Y.; Cao, J.; Wang, S. A dynamic user authentication scheme for wireless sensor networks. IEEE Inter. Conf. Sensor Netw. Ubiq. Trustworthy Comp. 2006, 1, 1–8. [Google Scholar]
- Li, X.; Peng, J.; Niu, J.; Wu, F.; Liao, J.; Choo, K.K.R. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J. 2018, 5, 1606–1615. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Wu, F.; Sangaiah, A.; Choo, K.K.R. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comp. Appl. 2018, 103, 194–204. [Google Scholar] [CrossRef]
- Lee, J.; Yu, S.; Park, K.; Park, Y.; Park, Y. Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 2019, 19, 2358. [Google Scholar] [CrossRef]
- Zhou, L.; Li, X.; Yeh, K.H.; Su, C.; Chiu, W. Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 2019, 91, 244–251. [Google Scholar] [CrossRef]
- Xue, K.; Hong, P.; Ma, C.A. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 2014, 80, 195–206. [Google Scholar] [CrossRef]
- Amin, R.; Kumar, N.; Biswas, G.P.; Iqbal, R.; Chang, V. A lightweight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 2018, 78, 1005–1019. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://www.avispa-project.org/ (accessed on 6 May 2019).
- SPAN: A Security Protocol Animator for AVISPA. Available online: http://www.avispa-project.org/ (accessed on 6 May 2019).
- Park, K.; Park, Y.; Park, Y.; Reddy, A.G.; Das, A.K. Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 2017, 5, 25110–25125. [Google Scholar] [CrossRef]
- Park, K.; Park, Y.; Park, Y.; Das, A.K. 2PAKEP: Provably secure and efficient two-party authenticated key exchange protocol for mobile environment. IEEE Access 2018, 6, 30225–30241. [Google Scholar] [CrossRef]
- Yu, S.; Lee, J.; Lee, K.; Park, K.; Park, Y. Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors 2018, 18, 3191. [Google Scholar] [CrossRef] [PubMed]
- Park, Y.; Park, Y. Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 2016, 16, 2123. [Google Scholar] [CrossRef] [PubMed]
- Wu, F.; Xu, L.; Kumari, S.; Li, X.; Shen, J.; Choo, K.K.R.; Wazid, M.; Das, A.K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 2017, 89, 72–85. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).