Cargando…

A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment

With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments, including smart home, smart factory, and smart healthcare. However, a user is insecure various types of attacks, because sensitive informatio...

Descripción completa

Detalles Bibliográficos
Autores principales: Yu, SungJin, Park, KiSung, Park, YoungHo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6720725/
https://www.ncbi.nlm.nih.gov/pubmed/31430911
http://dx.doi.org/10.3390/s19163598
_version_ 1783448192364314624
author Yu, SungJin
Park, KiSung
Park, YoungHo
author_facet Yu, SungJin
Park, KiSung
Park, YoungHo
author_sort Yu, SungJin
collection PubMed
description With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments, including smart home, smart factory, and smart healthcare. However, a user is insecure various types of attacks, because sensitive information is often transmitted via an open channel. Therefore, secure authentication schemes are essential to provide IoT services for legal users. In 2019, Pelaez et al. presented a lightweight IoT-based authentication scheme in cloud computing environment. However, we prove that Pelaez et al.’s scheme cannot prevent various types of attacks such as impersonation, session key disclosure, and replay attacks and cannot provide mutual authentication and anonymity. In this paper, we present a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to resolve these security problems. The proposed scheme can withstand various attacks and provide secure mutual authentication and anonymity by utilizing secret parameters and biometric. We also show that our scheme achieves secure mutual authentication using Burrows–Abadi–Needham logic analysis. Furthermore, we demonstrate that our scheme resists replay and man-in-the-middle attacks usingthe automated validation of internet security protocols and applications (AVISPA) simulation tool. Finally, we compare the performance and the security features of the proposed scheme with some existing schemes. Consequently, we provide better safety and efficiency than related schemes and the proposed scheme is suitable for practical IoT-based cloud computing environment.
format Online
Article
Text
id pubmed-6720725
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-67207252019-09-10 A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment Yu, SungJin Park, KiSung Park, YoungHo Sensors (Basel) Article With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments, including smart home, smart factory, and smart healthcare. However, a user is insecure various types of attacks, because sensitive information is often transmitted via an open channel. Therefore, secure authentication schemes are essential to provide IoT services for legal users. In 2019, Pelaez et al. presented a lightweight IoT-based authentication scheme in cloud computing environment. However, we prove that Pelaez et al.’s scheme cannot prevent various types of attacks such as impersonation, session key disclosure, and replay attacks and cannot provide mutual authentication and anonymity. In this paper, we present a secure and lightweight three-factor authentication scheme for IoT in cloud computing environment to resolve these security problems. The proposed scheme can withstand various attacks and provide secure mutual authentication and anonymity by utilizing secret parameters and biometric. We also show that our scheme achieves secure mutual authentication using Burrows–Abadi–Needham logic analysis. Furthermore, we demonstrate that our scheme resists replay and man-in-the-middle attacks usingthe automated validation of internet security protocols and applications (AVISPA) simulation tool. Finally, we compare the performance and the security features of the proposed scheme with some existing schemes. Consequently, we provide better safety and efficiency than related schemes and the proposed scheme is suitable for practical IoT-based cloud computing environment. MDPI 2019-08-19 /pmc/articles/PMC6720725/ /pubmed/31430911 http://dx.doi.org/10.3390/s19163598 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yu, SungJin
Park, KiSung
Park, YoungHo
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title_full A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title_fullStr A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title_full_unstemmed A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title_short A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
title_sort secure lightweight three-factor authentication scheme for iot in cloud computing environment
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6720725/
https://www.ncbi.nlm.nih.gov/pubmed/31430911
http://dx.doi.org/10.3390/s19163598
work_keys_str_mv AT yusungjin asecurelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment
AT parkkisung asecurelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment
AT parkyoungho asecurelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment
AT yusungjin securelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment
AT parkkisung securelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment
AT parkyoungho securelightweightthreefactorauthenticationschemeforiotincloudcomputingenvironment