z-logo
open-access-imgOpen Access
Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
Author(s) -
Irshad Azeem,
Chaudhry Shehzad Ashraf
Publication year - 2021
Publication title -
iet networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.466
H-Index - 21
eISSN - 2047-4962
pISSN - 2047-4954
DOI - 10.1049/ntw2.12014
Subject(s) - elgamal encryption , computer science , cloud computing , cryptosystem , authentication (law) , mutual authentication , computer security , computer network , protocol (science) , authentication protocol , denial of service attack , cryptography , the internet , encryption , public key cryptography , world wide web , operating system , medicine , alternative medicine , pathology
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi: 10.1049/iet-net.2019.0004 , which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT applications. In this protocol, the authors claim that their scheme provides mutual authentication. However, it is demonstrated in this article that the protocol merely supports unilateral authentication, which may result in clogging attack on the server's end. This is because the latter is unable to verify the authentication request in absolute terms, which might lead to resource clogging as well as denial of service attack affecting its Quality of Service (QoS).

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here