Loading [a11y]/accessibility-menu.js
Comments on the authentication scheme for IoT and cloud servers | IEEE Conference Publication | IEEE Xplore

Comments on the authentication scheme for IoT and cloud servers


Abstract:

Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security w...Show More

Abstract:

Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.
Date of Conference: 27-29 May 2016
Date Added to IEEE Xplore: 28 July 2016
ISBN Information:
Conference Location: Nantou, Taiwan

References

References is not available for this document.