Affordable Access

Access to the full text

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

  • Huang, Huihui1
  • Lu, Siqi1, 2
  • Wu, Zehui1
  • Wei, Qiang1
  • 1 State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China , Zhengzhou (China)
  • 2 Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, Henan, 450001, China , Zhengzhou (China)
Published Article
EURASIP Journal on Wireless Communications and Networking
Springer International Publishing
Publication Date
Jul 10, 2021
DOI: 10.1186/s13638-021-02022-1
Springer Nature
  • Security & Privacy Solutions for Smart City


With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices, distributed servers, authentication centers, etc. In 2020, Kang et al. improved an authentication protocol for IoT-Enabled devices in a distributed cloud computing environment and its main purpose was in order to prevent counterfeiting attacks in Amin et al.’ protocol, which was published in 2018. However, We found that the Kang et al.’s protocol still has a fatal vulnerability, that is, it is attacked by offline password guessing, and malicious users can easily obtain the master key of the control server. In this article, we extend their work to design a lightweight pseudonym identity based authentication and key agreement protocol using smart card. For illustrating the security of our protocol, we used the security protocol analysis tools of AVISPA and Scyther to prove that the protocol can defend against various existing attacks. We will further analyze the interaction between participants authentication path to ensure security protection from simulated attacks detailedly. In addition, based on the comparison of security functions and computing performance, our protocol is superior to the other two related protocols. As a result, the enhanced protocol will be efficient and secure in distributed cloud computing architecture for smart city.

Report this publication


Seen <100 times