2020
DOI: 10.1155/2020/3805058
|View full text |Cite
|
Sign up to set email alerts
|

A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Abstract: With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily lives. As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled devices. It is playing an increasingly important role in resource sharing. Due to the complexity and openness of wireless networks, the authentication protocol is crucial for secure communication and user privacy protection. In this paper, we discuss the limitations of a r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 37 publications
(74 reference statements)
0
22
0
Order By: Relevance
“…In 1991, Frank et al [43] presented a key agreement protocol that completely relies on HTTP. Conversely, Yang et al [41] presented that Frank et al were uncertain to withstand the vulnerabilities such as redirection, replay attack, and man-in-themiddle. Yang et al constructed a competent user authentication, which resolves the key issues of Frank et al Of late, several authentication mechanisms, namely two-factor [41], three-factor [11], identity-based [8], etc.…”
Section: Research Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…In 1991, Frank et al [43] presented a key agreement protocol that completely relies on HTTP. Conversely, Yang et al [41] presented that Frank et al were uncertain to withstand the vulnerabilities such as redirection, replay attack, and man-in-themiddle. Yang et al constructed a competent user authentication, which resolves the key issues of Frank et al Of late, several authentication mechanisms, namely two-factor [41], three-factor [11], identity-based [8], etc.…”
Section: Research Motivationmentioning
confidence: 99%
“…Conversely, Yang et al [41] presented that Frank et al were uncertain to withstand the vulnerabilities such as redirection, replay attack, and man-in-themiddle. Yang et al constructed a competent user authentication, which resolves the key issues of Frank et al Of late, several authentication mechanisms, namely two-factor [41], three-factor [11], identity-based [8], etc. have been constructed using pairing-based, factoring and discrete logarithm, elliptic-curve (EC) cryptography [22], and chaotic-map [40].…”
Section: Research Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…As far as we know, we are the first to apply Chebyshev chaotic map to SIP. Chebyshev chaotic map has been used in many environments to achieve identity verification, such as medical information system environment [25], cloud computing environment [26], and IOT environment [27]. Compared with other lightweight authentication schemes, Chebyshev chaotic map has higher level of efficiency and security.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, numerous user authentication schemes are proposed [4][5][6][7]. Most recently, Shuai et al [8] designed a new anonymous authentication scheme for a smart home environment.…”
Section: Introductionmentioning
confidence: 99%