A secure IoT-based authentication system in cloud computing environment

19Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

The Internet of Things (IoT) is currently the most popular field in communication and information techniques. However, designing a secure and reliable authentication scheme for IoT-based architectures is still a challenge. In 2019, Zhou et al. showed that schemes pro-posed by Amin et al. and Maitra et al. are vulnerable to off-line guessing attacks, user tracking attacks, etc. On this basis, a lightweight authentication scheme based on IoT is proposed, and an authentication scheme based on IoT is proposed, which can resist various types of attacks and realize key security features such as user audit, mutual authentication, and session security. However, we found weaknesses in the scheme upon evaluation. Hence, we proposed an enhanced scheme based on their mechanism, thus achieving the security requirements and resisting well-known attacks.

Cite

CITATION STYLE

APA

Wu, H. L., Chang, C. C., Zheng, Y. Z., Chen, L. S., & Chen, C. C. (2020). A secure IoT-based authentication system in cloud computing environment. Sensors (Switzerland), 20(19), 1–14. https://doi.org/10.3390/s20195604

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free