Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment

dc.authoridKumar, Neeraj/0000-0002-3020-3947
dc.authoridYahya, Khalid/0000-0002-0792-7031
dc.authoridChaudhry, Shehzad/0000-0002-9321-6956
dc.authoridZikria, Yousaf Bin/0000-0002-6570-5306
dc.authoridIrshad, Azeem/0000-0002-1366-2834
dc.authoridAlazab, Mamoun/0000-0002-1928-3704;
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorIrshad, Azeem
dc.contributor.authorYahya, Khalid
dc.contributor.authorKumar, Neeraj
dc.contributor.authorAlazab, Mamoun
dc.contributor.authorBin Zikria, Yousaf
dc.date.accessioned2024-09-11T19:52:07Z
dc.date.available2024-09-11T19:52:07Z
dc.date.issued2021
dc.departmentİstanbul Gelişim Üniversitesien_US
dc.description.abstractThe advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.en_US
dc.identifier.doi10.1145/3425707
dc.identifier.issn1533-5399
dc.identifier.issn1557-6051
dc.identifier.issue3en_US
dc.identifier.scopus2-s2.0-85111987577en_US
dc.identifier.urihttps://doi.org/10.1145/3425707
dc.identifier.urihttps://hdl.handle.net/11363/7913
dc.identifier.volume21en_US
dc.identifier.wosWOS:000713626400026en_US
dc.identifier.wosqualityQ1en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.language.isoenen_US
dc.publisherAssoc Computing Machineryen_US
dc.relation.ispartofAcm Transactions on Internet Technologyen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.snmz20240903_Gen_US
dc.subjectSecurityen_US
dc.subjectkey-agreementen_US
dc.subjectcloud securityen_US
dc.subjectIoTen_US
dc.subjectincorrectnessen_US
dc.subjecttraceabilityen_US
dc.subjectanonymityen_US
dc.titleRotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environmenten_US
dc.typeArticleen_US

Dosyalar