Abstract:
Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security w...Show MoreMetadata
Abstract:
Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.
Date of Conference: 27-29 May 2016
Date Added to IEEE Xplore: 28 July 2016
ISBN Information: