{"title":"An Enhanced of Secure Authentication Scheme for the Internet of Things","authors":"Marwa Ahmim, Abderrahmane Adjabi, Ahmim Ahmed, Sarra Namane","doi":"10.1109/PAIS56586.2022.9946906","DOIUrl":null,"url":null,"abstract":"In this paper, we cryptanalyze the authentication scheme proposed by Wang et al. [1] by pointing out that their scheme of authentication is vulnerable to several attacks. Afterwards, an Enhanced Secure Authentication Scheme (E-SAS) is presented to solve the security flaws of SAS. The informal security analysis and the formal security verification by the AVISPA tool illustrate that E-SAS is secure face to several active and passive security attacks. Therefore, the performance and security comparisons demonstrate that the E-SAS ensures robust security with less communication and computational overhead.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAIS56586.2022.9946906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we cryptanalyze the authentication scheme proposed by Wang et al. [1] by pointing out that their scheme of authentication is vulnerable to several attacks. Afterwards, an Enhanced Secure Authentication Scheme (E-SAS) is presented to solve the security flaws of SAS. The informal security analysis and the formal security verification by the AVISPA tool illustrate that E-SAS is secure face to several active and passive security attacks. Therefore, the performance and security comparisons demonstrate that the E-SAS ensures robust security with less communication and computational overhead.