TY - GEN
T1 - Analyzing of LAM-CIoT
T2 - 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020
AU - Alsahlani, Ahmed Yaser Fahad
AU - Popa, Alexandru
N1 - Publisher Copyright:
© 2020 IEEE.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2020/12/1
Y1 - 2020/12/1
N2 - Communicating smart entities in the Internet of Things (IoT) environment using cloud technology makes human daily life more convenient and brings benefits in various fields. After the occurrence of the novel coronavirus, the demand for remotely managed systems will significantly raise up to mitigate the harmful consequences of social distancing and to increase the systems' efficiency as well. In such systems, sharing relevant information among honest entities over public connection brings numerous security risks. In this context, in 2020, Wazid et al. proposed a new lightweight authentication mechanism for cloudbased IoT environment called LAM-CIoT. Their mechanism uses multi-factor authentication and provides real-time data access from the deployed IoT-sensors. Wazid et al. argued that the mechanism they proposed is stable, efficient and scalable. However, we find out that Wazid et al.'s mechanism shows weaknesses and is incomplete. In this paper, we briefly introduce Wazid et al.'s mechanism and expound that their mechanism is still unstable and not suitable to be applied in practice.
AB - Communicating smart entities in the Internet of Things (IoT) environment using cloud technology makes human daily life more convenient and brings benefits in various fields. After the occurrence of the novel coronavirus, the demand for remotely managed systems will significantly raise up to mitigate the harmful consequences of social distancing and to increase the systems' efficiency as well. In such systems, sharing relevant information among honest entities over public connection brings numerous security risks. In this context, in 2020, Wazid et al. proposed a new lightweight authentication mechanism for cloudbased IoT environment called LAM-CIoT. Their mechanism uses multi-factor authentication and provides real-time data access from the deployed IoT-sensors. Wazid et al. argued that the mechanism they proposed is stable, efficient and scalable. However, we find out that Wazid et al.'s mechanism shows weaknesses and is incomplete. In this paper, we briefly introduce Wazid et al.'s mechanism and expound that their mechanism is still unstable and not suitable to be applied in practice.
KW - Cloud computing
KW - Internet of Things (IoT)
KW - Multi-factor authentication
KW - Real-time data access.
KW - Security analysis
UR - http://www.scopus.com/inward/record.url?scp=85099681707&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099681707&partnerID=8YFLogxK
U2 - 10.1109/SSCI47803.2020.9308139
DO - 10.1109/SSCI47803.2020.9308139
M3 - Conference contribution
AN - SCOPUS:85099681707
T3 - 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020
SP - 1837
EP - 1844
BT - 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 1 December 2020 through 4 December 2020
ER -