{"title":"对物联网和云服务器认证方案的意见","authors":"Ting-Fang Cheng","doi":"10.1109/ICCE-TW.2016.7520711","DOIUrl":null,"url":null,"abstract":"Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.","PeriodicalId":6620,"journal":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","volume":"13 1","pages":"1-2"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comments on the authentication scheme for IoT and cloud servers\",\"authors\":\"Ting-Fang Cheng\",\"doi\":\"10.1109/ICCE-TW.2016.7520711\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.\",\"PeriodicalId\":6620,\"journal\":{\"name\":\"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)\",\"volume\":\"13 1\",\"pages\":\"1-2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE-TW.2016.7520711\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-TW.2016.7520711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comments on the authentication scheme for IoT and cloud servers
Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.