Yanbao Han, Baoyuan Kang, Kun Qian


With the advancement of computer science and technology, the society pays more and more attention to the application of Internet of Things technology. The Internet of Things technology brings convenience to people's lives, but various security vulnerabilities in IoT devices still threaten people's privacy. We describe the occurrence process of these security flaws and propose a robust lightweight three-factor authentication scheme based on IoT in a cloud computing environment. Then we analyzed the security and performance of the proposed scheme.


Cloud Computing; Key Agreement; Anonymity; Internet of Things

Full Text:



Jayavardhana Gubbi,,Rajkumar Buyya,,Slaven Marusic & Marimuthu Palaniswami.(2013).Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems(7),. doi:

Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. , & Konwinski, A. D. , et al. (2010). A view of cloud computing. Communications of the ACM.

Levine, John R, & Young, Margaret Levine. (1994). Internet for dummies. Calif Idg Books Worldwide Inc(100).

Madhusudhan, R. , & Mittal, R. C. . (2012). Dynamic id-based remote user password authentication schemes using smart cards: a review. Journal of Network and Computer Applications, 35(4), 1235–1248.

Chien, H. Y. , Jan, J. K. , & Tseng, Y. M. . (2002). An efficient and practical solution to remote authentication: smart card. Computers & Security, 21(4), 372-375.

Jianming Zhu, & Jianfeng Ma. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Press.

Wong, K. H. M. , Zheng, Y. , Cao, J. , & Wang, S. . (2006). A dynamic user authentication scheme for wireless sensor networks. IEEE International Conference on Sensor Networks. IEEE.

Yunho Lee, Seungjoo Kim, & Dongho Won. (2010). Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Pergamon Press, Inc.

Kim, J. , Lee, D. , Jeon, W. , Lee, Y. , & Won, D. . (2014). Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors, 14(4), 6443-6462.

Wang, D. , & Wang, P. . (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Computer Networks, 73(nov.14), 41-57.

Liao, Y. P. , & Wang, S. S. . (2009). A secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.

Hsiang, H. C. , & Shih, W. K. . (2009). Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118-1123.

Sood, S. K. , Sarje, A. K. , & Singh, K. . (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network & Computer Applications, 34(2), 609-618.

Li, X. , Xiong, Y. , Ma, J. , & Wang, W. . (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network & Computer Applications, 35(2), 763-769.

Xue, K. , Hong, P. , & Ma, C. . (2014). A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. Journal of Computer & System ences, 80(1), 195-206.

Amin, R. , Kumar, N. , Biswas, G. P. , Iqbal, R. , & Chang, V. . (2016). A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78(PT.3), 1005-1019.

Zhou, L. , Li, X. , Yeh, K. H. , Su, C. , & Chiu, W. . (2019). Lightweight iot-based authentication scheme in cloud computing circumstance. Future generation computer systems, 91(FEB.), 244-251.

Rafael Martínez-Peláez, Toral-Cruz, H. , Parra-Michel, J. R. , Vicente García, & Ochoa, A. . (2019). An enhanced lightweight iot-based authentication scheme in cloud computing circumstances. Sensors, 19(9), 2098.

Yu, S. J. , Park, K. S. , & Park, Y. H. . (2019). A secure lightweight three-factor authentication scheme for iot in cloud computing environment. Sensors, 19(16), 3598.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2019 International Educational Applied Scientific Research Journal