首页|A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
扫码查看
点击上方二维码区域,可以放大扫码查看
原文链接
万方数据
Because of the increasing number of threats in the IoT cloud,an advanced security mechanism is needed to guard data against hacking or attacks.A user authentication mechanism is also required to authenticate the user accessing the cloud services.The conventional cryptographic algorithms used to provide security mecha-nisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks.Therefore,developing new solutions based on different mechanisms from traditional cryptography methods is required to pro-tect data and users'privacy from attacks.Different from the conventional cryptography method,we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper.We use visual cryptogra-phy to encrypt and decrypt the secret images.The mutual authentication is based on two secret images and tickets.The user requests the ticket from the authentication server(AS)to obtain the permission for accessing the cloud ser-vices.Three shared secret keys are used for encrypting and decrypting the authentication process.We analyze the protocol using the Barrows-Abadi-Needham(BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks.Also,it can provide a secure mutual authentication mechanism.
Internet of thingsVisual cryptographySecurityMutual authenticationIoT-cloud
Brou Bernard Ehui、Chen CHEN、Shirui WANG、Hua GUO、Jianwei LIU
展开 >
School of Cyber Sciences and Technology,Beihang University,Beijing 100191,China
State Key Laboratory of Software Development Environment,Beihang University,Beijing 100191,China