2023
DOI: 10.1186/s13638-023-02245-4
|View full text |Cite
|
Sign up to set email alerts
|

Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

Abstract: With the continuous progress of the Internet of Things (IoT) technology, IoT devices have gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with limited memory resources cannot store massive data. Cloud computing is an Internet-centric network that can provide security services and data storage. The combination of IoT devices with cloud computing considerably promotes resource sharing, facilitates users’ access to information at any time, and provides users with correspon… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 49 publications
0
6
0
Order By: Relevance
“…Encryption can protect data from being intercepted and viewed by unauthorized parties during transmission. Developers can use techniques such as end-to-end encryption or transport layer security to secure data in transit using authenticated key agreement schemes [33][34][35] in different environments and symmetric or asymmetric encryption to protect data stored on the chatbot's database.…”
Section: Discussionmentioning
confidence: 99%
“…Encryption can protect data from being intercepted and viewed by unauthorized parties during transmission. Developers can use techniques such as end-to-end encryption or transport layer security to secure data in transit using authenticated key agreement schemes [33][34][35] in different environments and symmetric or asymmetric encryption to protect data stored on the chatbot's database.…”
Section: Discussionmentioning
confidence: 99%
“…We visually compare the safety elements of the proposed scheme and related schemes [ 11 , 21 , 44 , 45 , 46 , 47 , 48 ] and record them in Table 3 , which includes various types of safety elements such as “insider attack”, “impersonation attack”, “stolen verification attack”, “ESL attack”, “privileged attack”, “perfect forward secrecy”, “reply attack”, “offline password-guessing attack”, “session key disclosure”, “mutual authentication”, “DoS attack”, “user anonymity”, and “untraceability”. Ultimately, the proposed scheme offers more security features compared to Wu et al’s scheme, and it exhibits fewer features that are either unidentified or not provided, even when compared to the schemes of other related works.…”
Section: Performance Analysismentioning
confidence: 99%
“…We conducted a comparative analysis of communication costs between the related schemes [ 11 , 21 , 44 , 45 , 46 , 47 , 48 ] and the proposed scheme. Based on [ 11 ], we assume the bit lengths of hash function, timestamp, string, identity, random number, fuzzy extractor, and encryption operation to be 256, 32, 160, 160, 160, 8, and 256 bits, respectively.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations