Research Article

[Retracted] A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing

Table 2

Login and authentication phase.

UserPublic cloud server (PS)IOT device

IDu, PWu
Computes:
 = rep(BIO, )
PIDu = h(IDu||
P u = h(PWu||
M = h(IDu||PWu||
U 1 = DM(U2)
r u = U3h(PIDu||Pu)
MSKups = U1h(ru||Pu)
U 4? = h(PIDu||Pu||ru)
Select TLA1 and r2
S 1 = (IDu||r2)  MSKupsTLA1
S 2 = PIDuh(MSKups||r2||TLA1)
S 3 = h(PIDU||MSKups||r2||TLA1)
Check TLA1-TT
MSKups = h(IDps||SKps) Nu
(IDi||r2) = S1 MSKupsTLA1
PIDu = S2h(MSKups||r2||TLA1)
S3? = h(PIDu||MSKups||r2||TLA1)
Select TLA2, r3
MSKips = h(IDi||SKps)
S 4 = (PIDu||IDps||r2||r3) h(IDi||MSKips||TLA2)
S 5 = h(PIDu||IDps||MSKips||r2||r3||TLA2)
Check TLA2-TT
r i = D1h(IDi||SKi)
MSKips = D2h(SKi||ri)
(PIDu||IDps||r2||r3) = S4h(IDi||MSKips||TLA2)
S5? = h(PIDu||IDps||MSKips||r2||r3||TLA2)
Select TLA3 and r4
S 6 = h(MSKips||PIDi||IDps||TLA3) r4
S K = h(r2||r3||r4||PIDu||IDps||IDi)
S 7 = h(IDi||r4||MSKips||SK||TLA3)
Message3{S6, S7, TLA3}
Check TLA3-TT
r 4 = S6h(MSKips||PIDi||IDps||TLA3)
S K = h(r2||r3||r4||PIDu||IDps||IDi)
S7? = h(IDi||r4||MSKips||SK||TLA3)
Select TLA4
S 8= (IDps||r3||r4) h(PIDu||MSKups||r2||TLA4)
S 9 = h(PIDu||IDps||r2||r3||SK||TLA4)
Xnew = h(IDu||r3||MSKups)
Check TLA4-TT
(IDps||r3||r4) = S8h(PIDu||MSKups||r2||TLA4)
S K = h(r2||r3||r4||PIDu||IDps||IDi)
S9? = h(PIDu||IDps||r2||r3||SK||TLA4)
X = h(IDu||r3||MSKups)