2022
DOI: 10.3390/s22103858
|View full text |Cite
|
Sign up to set email alerts
|

Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments

Abstract: With the rapid development of technology based on the Internet of Things (IoT), numerous IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role in solving the resource constraints of IoT devices and in promoting resource sharing, whereby users can access IoT services provided in various environments. However, this complex and open wireless network environment poses security and privacy challenges. Therefore, designing a secure authentication protocol is crucial to protect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 38 publications
0
16
0
Order By: Relevance
“…Additionally, it cannot offer perfect forward secrecy. Therefore, a lightweight authentication protocol is presented in [12].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, it cannot offer perfect forward secrecy. Therefore, a lightweight authentication protocol is presented in [12].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…In this environment, numerous devices and sensors need to establish connections with each other and exchange or store massive amounts of information [11]. Cloud computing solves these issues by offering efficient platform to analyze, manage and store the generated IoT data [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…A simple authentication scheme for IoT-enabled CC systems was developed in another study. 24 To do a formal security study, a real or random model and the automatic verification program ProVerif were utilized. More evidence of its security came from a casual investigation.…”
Section: Related Workmentioning
confidence: 99%
“…Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction [1], [2], [3], [4], [5]. According to NIST, cloud model is composed of five essential characteristics explained below:…”
Section: Introductionmentioning
confidence: 99%