{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:53:46Z","timestamp":1768917226647,"version":"3.49.0"},"reference-count":34,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T00:00:00Z","timestamp":1557100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.<\/jats:p>","DOI":"10.3390\/s19092098","type":"journal-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T11:22:35Z","timestamp":1557400955000},"page":"2098","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2188-9892","authenticated-orcid":false,"given":"Rafael","family":"Mart\u00ednez-Pel\u00e1ez","sequence":"first","affiliation":[{"name":"Facultad de Tecnolog\u00edas de Informaci\u00f3n, Universidad De La Salle Baj\u00edo, Av. Universidad 602, Le\u00f3n 37150, Mexico"}]},{"given":"Homero","family":"Toral-Cruz","sequence":"additional","affiliation":[{"name":"Department of Sciences and Engineering, University of Quintana Roo, Blvd Bah\u00eda S\/N, Chetumal 77019, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9145-5574","authenticated-orcid":false,"given":"Jorge R.","family":"Parra-Michel","sequence":"additional","affiliation":[{"name":"Facultad de Tecnolog\u00edas de Informaci\u00f3n, Universidad De La Salle Baj\u00edo, Av. Universidad 602, Le\u00f3n 37150, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2820-2918","authenticated-orcid":false,"given":"Vicente","family":"Garc\u00eda","sequence":"additional","affiliation":[{"name":"Departamento de Ingenier\u00eda El\u00e9ctrica y Computaci\u00f3n, Universidad Aut\u00f3noma de Ciudad Ju\u00e1rez, Av. Jos\u00e9 de Jes\u00fas Mac\u00edas Delgado 18100, Cd. Ju\u00e1rez 32310, Mexico"}]},{"given":"Luis J.","family":"Mena","sequence":"additional","affiliation":[{"name":"Unidad Acad\u00e9mica de Computaci\u00f3n, Universidad Polit\u00e9cnica de Sinaloa, Ctra. Libre Mazatl\u00e1n Higueras Km 3, Mazatl\u00e1n 82199, Mexico"}]},{"given":"Vanessa G.","family":"F\u00e9lix","sequence":"additional","affiliation":[{"name":"Unidad Acad\u00e9mica de Computaci\u00f3n, Universidad Polit\u00e9cnica de Sinaloa, Ctra. Libre Mazatl\u00e1n Higueras Km 3, Mazatl\u00e1n 82199, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3327-8562","authenticated-orcid":false,"given":"Alberto","family":"Ochoa-Brust","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda Mec\u00e1nica y El\u00e9ctrica, Universidad de Colima, Av. Universidad 333, Colima 28040, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","article-title":"A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment","volume":"78","author":"Amin","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Noura, M., Atiquzzman, M., and Gaedke, M. (2018). Interoperability in internet of things: Taxonomies and open challenges. Mob. Netw. Appl.","DOI":"10.1007\/s11036-018-1089-9"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., and Lu, S. (2008, January 12\u201316). Cloud computing and grid computing 360-degree compared. Proceedings of the Workshop on Grid Computing Environments (GCE), Austin, TX, USA.","DOI":"10.1109\/GCE.2008.4738445"},{"key":"ref_4","first-page":"101","article-title":"Cloud computing in brief","volume":"18","author":"Sova","year":"2016","journal-title":"IOSR J. Comput. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., and Shu, L. (2017). Authentication protocols for internet of things: A comprehensive survey. Secur. Commun. Netw.","DOI":"10.1155\/2017\/6562953"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A survey of internet of things (IoT) Authentication schemes. Sensors, 19.","DOI":"10.3390\/s19051141"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A survey on the edge computing for the internet of things","volume":"6","author":"Yu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez Maim\u00f3, L., Huertas Celdr\u00e1n, A., Perales G\u00f3mez, A.L., Garc\u00eda Clemente, F.J., Weimer, J., and Lee, I. (2019). Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors, 19.","DOI":"10.3390\/s19051114"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"26521","DOI":"10.1109\/ACCESS.2017.2775180","article-title":"Internet of things for smart healthcare: Technologies, challenges, and opportunities","volume":"5","author":"Baker","year":"2017","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","article-title":"Efficient end-to-end authentication protocol for wearable health monitoring systems","volume":"63","author":"Jang","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of things for smart cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1660","DOI":"10.1109\/ACCESS.2015.2389854","article-title":"A survey on internet of things from industrial market perspective","volume":"2","author":"Perera","year":"2015","journal-title":"IEEE Access"},{"key":"ref_13","first-page":"1706","article-title":"Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment","volume":"6","author":"Sankar","year":"2017","journal-title":"IEEE Access"},{"key":"ref_14","first-page":"e3900","article-title":"User centric three-factor authentication protocol for cloud-assited wearable devices","volume":"9","author":"Jiang","year":"2009","journal-title":"Int. J. Commun. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1016\/j.jnca.2012.01.007","article-title":"Dynamic id-based remote user password authentication schemes using smart cards: A review","volume":"35","author":"Madhusudhan","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","article-title":"Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment","volume":"12","author":"Wang","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_17","first-page":"708","article-title":"Two birds with one stone: Two-factor authentication with security beyond conventional bound","volume":"15","author":"Wang","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_19","unstructured":"Hwang, T., Chen, Y., and Laih, C.S. (1990, January 24\u201327). Non-interactive password authentication without password tables. Proceedings of the 1990 IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, China."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","article-title":"A new remote user authentication scheme for multi-server architecture","volume":"19","author":"Lin","year":"2003","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","article-title":"A remote password authentication scheme for multi-server architecture using neural networks","volume":"12","author":"Li","year":"2001","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","article-title":"A secure dynamic ID based remote user authentication scheme for multi-server environment","volume":"31","author":"Liao","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","article-title":"Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment","volume":"31","author":"Hsiang","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_24","first-page":"106","article-title":"Efficient and secure dynamic ID-based remote user authentication scheme with session key agreement for multi-server environment","volume":"2","author":"Pomykala","year":"2010","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kim, M., Park, N., and Won, D. (2012). Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. Computer Applications for Security, Control and System Engineering, Springer.","DOI":"10.1007\/978-3-642-35264-5_17"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","article-title":"An efficient and security dynamic identity based authentication protocol for multi-server architecture using smartcards","volume":"35","author":"Li","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","article-title":"A secure dynamic identity based authentication protocol for multiserver architecture","volume":"34","author":"Sood","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","article-title":"A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture","volume":"80","author":"Xue","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_29","unstructured":"Challa, S., Das, A.K., Gope, P., Kumar, N., Wu, F., and Vasilakos, A.V. (2018). Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","article-title":"Lightweight IoT-based authentication scheme in cloud computing circumstance","volume":"91","author":"Zhou","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","article-title":"A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks","volume":"36","author":"Amin","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","article-title":"An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment","volume":"89","author":"Wu","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_33","unstructured":"Wienner, M. (1999). Differential power analysis. Advances in Cryptology, Springer."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","article-title":"Examining smart-card security under the threat of power analysis attacks","volume":"51","author":"Messerger","year":"2002","journal-title":"IEEE Trans. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/2098\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:49:30Z","timestamp":1760186970000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/2098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,6]]},"references-count":34,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["s19092098"],"URL":"https:\/\/doi.org\/10.3390\/s19092098","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,6]]}}}