{"title":"Comments on the authentication scheme for IoT and cloud servers","authors":"Ting-Fang Cheng","doi":"10.1109/ICCE-TW.2016.7520711","DOIUrl":null,"url":null,"abstract":"Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"13 1","pages":"1-2"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-TW.2016.7520711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.