计算机科学
认证(法律)
云计算
架空(工程)
计算机安全
钥匙(锁)
计算机网络
密码分析
同步(交流)
物联网
访问控制
身份验证协议
协议(科学)
方案(数学)
会话密钥
密码学
频道(广播)
加密
操作系统
医学
替代医学
病理
数学分析
数学
作者
Nishant Doshi,Payal Chaudhari
标识
DOI:10.1016/j.procs.2023.03.120
摘要
In today's wireless based applications, sensors are playing the vital role due to its pluses like low cost, low maintenance, hostile environment etc. On other end, cloud based technologies are increasing day-by-day to make its presence in the life of people for processing large chunk of data. Also, Internet of Things (IoT) is making its way by utilizing the sensors for various internet based applications and to connect to them with cloud. In all of these technologies, the major issue is authentication i.e. user from distance can access the server and authenticate via insecure channel. Recently, Lee et al. proposed the authentication scheme in IoT based environment using sensors and claimed it to be secure against various attacks. However, in this research we have analyzed the scheme and prove that it is yet susceptible to key control, time synchronization and stolen verifier. In addition, there will be overhead for verification which can lead to the DoS attack for large setup.
科研通智能强力驱动
Strongly Powered by AbleSci AI