Download presentation
Presentation is loading. Please wait.
1
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
Source: Sensors, Volume 19, Issue 9 (May ) Authors: Rafael Martínez-Peláez, Homero Toral-Cruz, Jorge R. Parra-Michel, Vicente García, Luis J. Mena, Vanessa G. Félix and Alberto Ochoa-Brust Speaker: Yao-Zhu Zheng Date: 2019/06/27
2
Outline Introduction Proposed scheme Experimental results Conclusions
3
Introduction Cloud Computing
4
Introduction IoT
5
Proposed scheme Registration phase Login phase Authentication phase
Key agreement phase Mutual Authentication
6
Proposed scheme - Notations
7
Proposed scheme - Registration
User Registration Cloud Server Registration
8
Proposed scheme - Registration
User Registration
9
Proposed scheme - Registration
Cloud Server Registration
10
Proposed scheme - Login
11
Proposed scheme - Authentication
13
Proposed scheme - Key Agreement and Mutual Authentication
17
Experimental results - Security comparison
Security Property [1] [2] [3] Our Scheme Provide evidence of connection attempt fails success Provide mutual authentication Provide user anonymity Resist impersonation attack Resist off-line user identity/password attack Resist privileged-insider attack Resist replay attack [1] Xue, K.; Hong, P.; Ma, C. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 2014, 80, 195–206. [2] Amin, R.; Kumar, N.; Biswas, G.P.; Iqbal, R.; Chang, V. A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 2018, 78, 1005–1019. [3] Zhou, L.; Li, X.; Yeh, K.H.; Su, C.; Chiu, W. Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 2019, 91, 244–251.
18
Experimental results - Performance comparison
Phase character [1] [2] [3] Our Scheme Registration Ui 3Th 2Th Sj 0Th 1Th CS 4Th 12Th Login 6Th 0Th + 3Ts Authentication 4Th+ 3Ts 2Th+ 3Ts 14Th 10Th 19Th 21Th+ 2Ts Total 36Th 30Th 43Th 48Th+ 8Ts Th = ms (represents a hash function) Ts = ms (represents an encryption/decryption operation using AES algorithm.)
19
Experimental results - Communication cost comparison
Phase character [1] [2] [3] Our Scheme Registration Ui 384 256 Sj CS 768 512 Login 640 1408 1152 1280 Authentication Total(bits) 3840 3456 4352
20
Conclusions Better security than other schemes
Acceptable communication-cost and computational-cost
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.