Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source: Sensors, Volume 19, Issue 9 (May )

Similar presentations


Presentation on theme: "Source: Sensors, Volume 19, Issue 9 (May )"— Presentation transcript:

1 An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
Source: Sensors, Volume 19, Issue 9 (May ) Authors: Rafael Martínez-Peláez, Homero Toral-Cruz, Jorge R. Parra-Michel, Vicente García, Luis J. Mena, Vanessa G. Félix and Alberto Ochoa-Brust Speaker: Yao-Zhu Zheng Date: 2019/06/27

2 Outline Introduction Proposed scheme Experimental results Conclusions

3 Introduction Cloud Computing

4 Introduction IoT

5 Proposed scheme Registration phase Login phase Authentication phase
Key agreement phase Mutual Authentication

6 Proposed scheme - Notations

7 Proposed scheme - Registration
User Registration Cloud Server Registration

8 Proposed scheme - Registration
User Registration

9 Proposed scheme - Registration
Cloud Server Registration

10 Proposed scheme - Login

11 Proposed scheme - Authentication

12

13 Proposed scheme - Key Agreement and Mutual Authentication

14

15

16

17 Experimental results - Security comparison
Security Property [1] [2] [3] Our Scheme Provide evidence of connection attempt fails success Provide mutual authentication Provide user anonymity Resist impersonation attack Resist off-line user identity/password attack Resist privileged-insider attack Resist replay attack [1] Xue, K.; Hong, P.; Ma, C. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 2014, 80, 195–206.  [2] Amin, R.; Kumar, N.; Biswas, G.P.; Iqbal, R.; Chang, V. A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 2018, 78, 1005–1019.  [3] Zhou, L.; Li, X.; Yeh, K.H.; Su, C.; Chiu, W. Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 2019, 91, 244–251.

18 Experimental results - Performance comparison
Phase character [1] [2] [3] Our Scheme Registration Ui 3Th 2Th Sj 0Th 1Th CS 4Th 12Th Login 6Th 0Th + 3Ts Authentication 4Th+ 3Ts 2Th+ 3Ts 14Th 10Th 19Th 21Th+ 2Ts Total 36Th 30Th 43Th 48Th+ 8Ts Th = ms (represents a hash function) Ts = ms (represents an encryption/decryption operation using AES algorithm.)

19 Experimental results - Communication cost comparison
Phase character [1] [2] [3] Our Scheme Registration Ui 384 256 Sj CS 768 512 Login 640 1408 1152 1280 Authentication Total(bits) 3840 3456 4352

20 Conclusions Better security than other schemes
Acceptable communication-cost and computational-cost


Download ppt "Source: Sensors, Volume 19, Issue 9 (May )"

Similar presentations


Ads by Google