Affordable Access

Access to the full text

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

Authors
  • Huang, Huihui1
  • Lu, Siqi1, 2
  • Wu, Zehui1
  • Wei, Qiang1
  • 1 State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China , Zhengzhou (China)
  • 2 Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, Henan, 450001, China , Zhengzhou (China)
Type
Published Article
Journal
EURASIP Journal on Wireless Communications and Networking
Publisher
Springer International Publishing
Publication Date
Jul 10, 2021
Volume
2021
Issue
1
Identifiers
DOI: 10.1186/s13638-021-02022-1
Source
Springer Nature
Keywords
Disciplines
  • Security & Privacy Solutions for Smart City
License
Green

Abstract

With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices, distributed servers, authentication centers, etc. In 2020, Kang et al. improved an authentication protocol for IoT-Enabled devices in a distributed cloud computing environment and its main purpose was in order to prevent counterfeiting attacks in Amin et al.’ protocol, which was published in 2018. However, We found that the Kang et al.’s protocol still has a fatal vulnerability, that is, it is attacked by offline password guessing, and malicious users can easily obtain the master key of the control server. In this article, we extend their work to design a lightweight pseudonym identity based authentication and key agreement protocol using smart card. For illustrating the security of our protocol, we used the security protocol analysis tools of AVISPA and Scyther to prove that the protocol can defend against various existing attacks. We will further analyze the interaction between participants authentication path to ensure security protection from simulated attacks detailedly. In addition, based on the comparison of security functions and computing performance, our protocol is superior to the other two related protocols. As a result, the enhanced protocol will be efficient and secure in distributed cloud computing architecture for smart city.

Report this publication

Statistics

Seen <100 times