Your browser doesn't support javascript.
loading
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances.
Martínez-Peláez, Rafael; Toral-Cruz, Homero; Parra-Michel, Jorge R; García, Vicente; Mena, Luis J; Félix, Vanessa G; Ochoa-Brust, Alberto.
Afiliação
  • Martínez-Peláez R; Facultad de Tecnologías de Información, Universidad De La Salle Bajío, Av. Universidad 602, León 37150, Mexico. rmartinezp@delasalle.edu.mx.
  • Toral-Cruz H; Department of Sciences and Engineering, University of Quintana Roo, Blvd Bahía S/N, Chetumal 77019, Mexico. htoral@uqroo.edu.mx.
  • Parra-Michel JR; Facultad de Tecnologías de Información, Universidad De La Salle Bajío, Av. Universidad 602, León 37150, Mexico. jrparra@delasalle.edu.mx.
  • García V; Departamento de Ingeniería Eléctrica y Computación, Universidad Autónoma de Ciudad Juárez, Av. José de Jesús Macías Delgado 18100, Cd. Juárez 32310, Mexico. vicente.jimenez@uacj.mx.
  • Mena LJ; Unidad Académica de Computación, Universidad Politécnica de Sinaloa, Ctra. Libre Mazatlán Higueras Km 3, Mazatlán 82199, Mexico. lmena@upsin.edu.mx.
  • Félix VG; Unidad Académica de Computación, Universidad Politécnica de Sinaloa, Ctra. Libre Mazatlán Higueras Km 3, Mazatlán 82199, Mexico. vfelix@upsin.edu.mx.
  • Ochoa-Brust A; Facultad de Ingeniería Mecánica y Eléctrica, Universidad de Colima, Av. Universidad 333, Colima 28040, Mexico. aochoa@ucol.mx.
Sensors (Basel) ; 19(9)2019 May 06.
Article em En | MEDLINE | ID: mdl-31064133
ABSTRACT
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2019 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2019 Tipo de documento: Article