With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been widely used in our daily\nlives. As a new service paradigm, cloud computing aims at solving the resource-constrained problem of Internet-enabled\ndevices. It is playing an increasingly important role in resource sharing. Due to the complexity and openness of wireless\nnetworks, the authentication protocol is crucial for secure communication and user privacy protection. In this paper, we\ndiscuss the limitations of a recently introduced IoT-based authentication scheme for cloud computing. Furthermore, we\npresent an enhanced three-factor authentication scheme using chaotic maps. The session key is established based on Chebyshev\nchaotic-based Diffieâ??Hellman key exchange. In addition, the session key involves a long-term secret. It ensures that our scheme\nis secure against all the possible session key exposure attacks. Besides, our scheme can effectively update user password locally.\nBurrowsâ??Abadiâ??Needham logic proof confirms that our scheme provides mutual authentication and session key agreement.\nThe formal analysis under random oracle model proves the semantic security of our scheme. The informal analysis shows that\nour scheme is immune to diverse attacks and has desired features such as three-factor secrecy. Finally, the performance\ncomparisons demonstrate that our scheme provides optimal security features with an acceptable computation and\ncommunication overheads.
Loading....