Visible to the public Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function

TitleFlexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function
Publication TypeConference Paper
Year of Publication2018
AuthorsTaher, Bahaa Hussein, Wei, Lu Hong, Yassin, Ali A.
Conference NameProceedings of the 2018 2Nd International Conference on Computer Science and Artificial Intelligence
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6606-9
Keywordscomposability, embedded device, Embedded systems, IoT Cloud, Metrics, MITM Attack, mutual authentication, Preserving Privacy, pubcrawl, Resiliency
AbstractThe Internet of Things and cloud computing (IoT Cloud) have a wide resonance in the Internet and modern communication technology, which allows laptops, phones, sensors, embedded devices, and other things to connect and exchange information via the Internet. Therefore, IoT Cloud offers several facilities, such as resources, storage, sharing, exchange, and communication. However, IoT Cloud suffers from security problems, which are a vital issue in the information technology world. All embedded devices in IoT Cloud need to be supported by strong authentication and preservation of privacy data during information exchange via the IoT Cloud environment. Malicious attacks (such as replay, man-in-the-middle [MITM], and impersonation attacks) play the negative role of obtaining important information of devices. In this study, we propose a good scheme that overcomes the mentioned issues by resisting well-known attacks, such as MITM, insider, offline password guessing, dictionary, replay, and eavesdropping. Our work achieves device anonymity, forward secrecy, confidentiality, and mutual authentication. Security and performance analyses show that our proposed scheme is more efficient, flexible, and secure with respect to several known attacks compared with related schemes.
Citation Keytaher_flexible_2018