Research Article

A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Table 1

Related authentication schemes for cloud computing.

CategorySchemesAuthentication factorsCryptographic primitiveSecurity limitations

Public key cryptosystem-based schemesTsai and Lo [18]Three-factorBilinear pairingServer impersonation attack
He et al. [19]Two-factorBilinear pairingInefficient typo detection
Kumari et al. [20]Three-factorElliptic curve cryptosystemKnown session-specific temporary information attack
Fails to preserve three-factor secrecy
Mo et al. [25]Two-factorElliptic curve cryptosystemStolen-verifier attack
Forgery attack
Replay attack
Known session-specific temporary information attack

Hash-based schemesAmin et al. [21]Two-factorHash functionOff-line guessing attack
Session key disclosure attack
Fails to preserve forward secrecy
Known session-specific temporary information attack
Xue et al. [22]Two-factorHash functionUser anonymity
Privileged insider attack
Off-line password guessing attack
Fails to preserve forward secrecy
Chuang and Chen [23]Three-factorHash functionUser impersonation attack
Session key discloser attack
Fails to preserve forward secrecy
Zhou et al. [26]Two-factorHash functionForgery attack
Replay attack
Fails to preserve forward secrecy
Known session-specific temporary information attack