Abstract
In recent years, more and more authentication protocols combining cloud computing and IoT are proposed for secure communication and access of the Internet of things. In 2020, Kang et al. Proposed a mutual authentication protocol based on distributed cloud computing environment for secure communication. They claim that their agreement can withstand all kinds of attacks. Unfortunately, this paper certificates that Kang et al.’s scheme is very vulnerable to temporary information attack of specific session.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akram, M.A., Ghaffar, Z., Mahmood, K., Kumari, S., Agarwal, K., Chen, C.M.: An anonymous authenticated key-agreement scheme for multi-server infrastructure. HCIS 10, 1–18 (2020)
Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005–1019 (2018)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on “an improved secure and efficient password and chaos-based two-party key agreement protocol”. Nonlinear Dyn. 87(3), 2073–2075 (2017)
Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. Ieee Access 5, 3410–3422 (2017)
Chen, Y.Q., Zhou, B., Zhang, M., Chen, C.M.: Using iot technology for computer-integrated manufacturing systems in the semiconductor industry. Appl. Soft Comput. 89, 106065 (2020)
Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4), 1411–1418 (2014)
He, B.Z., Chen, C.M., Wu, T.Y., Sun, H.M.: An efficient solution for hierarchical access control problem in cloud environment. Math. Prob. Eng. (2014)
Kang, B., Han, Y., Qian, K., Du, J.: Analysis and improvement on an authentication protocol for iot-enabled devices in distributed cloud computing environment. Math. Prob. Eng. (2020)
Kumari, S., Chaudhary, P., Chen, C.M., Khan, M.K.: Questioning key compromise attack on ostad-sharif et al.’s authentication and session key generation scheme for healthcare applications. IEEE Access 7, 39717–39720 (2019)
Shamshad, S., Mahmood, K., Kumari, S., Chen, C.M., et al.: A secure blockchain-based e-health records storage and sharing scheme. J. Inf. Secur. Appl. 55, 102590 (2020)
Sun, H.M., Wang, K.H., Chen, C.M.: On the security of an efficient time-bound hierarchical key management scheme. IEEE Trans. Depend. Secur. Comput. 6(2), 159–160 (2009)
Wang, K., Chen, C.M., Liang, Z., Hassan, M.M., Sarné, G.M., Fotia, L., Fortino, G.: A trusted consensus fusion scheme for decentralized collaborated learning in massive iot domain. Inf. Fusion 72, 100–109 (2021)
Wang, K., Xu, P., Chen, C.M., Kumari, S., Shojafar, M., Alazab, M.: Neural architecture search for robust networks in 6g-enabled massive iot domain. IEEE Internet Things J. (2020)
Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for internet of things. Pervasive Mob. Comput. 42, 15–26 (2017)
Wu, T.Y., Chen, C.M., Wang, K.H., Wu, J.M.T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49232–49239 (2019)
Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8, 28096–28108 (2020)
Wu, T.Y., Yang, L., Lee, Z., Chen, C.M., Pan, J.S., Islam, S.: Improved ecc-based three-factor multiserver authentication scheme. Secur. Commun. Netw. (2021)
Xiong, H., Wang, Y., Li, W., Chen, C.M.: Flexible, efficient, and secure access delegation in cloud computing. ACM Trans. Manag. Inf. Syst. (TMIS) 10(1), 1–20 (2019)
Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)
Zhou, L., Li, X., Yeh, K.H., Su, C., Chiu, W.: Lightweight iot-based authentication scheme in cloud computing circumstance. Futur. Gener. Comput. Syst. 91, 244–251 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, Z., Yang, L., Wu, TY., Chen, CM. (2022). Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment. In: Zhang, JF., Chen, CM., Chu, SC., Kountchev, R. (eds) Advances in Intelligent Systems and Computing. Smart Innovation, Systems and Technologies, vol 268. Springer, Singapore. https://doi.org/10.1007/978-981-16-8048-9_32
Download citation
DOI: https://doi.org/10.1007/978-981-16-8048-9_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8047-2
Online ISBN: 978-981-16-8048-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)