An Efficient Authentication Scheme Based on Mutual Verification for IoT Devices in Cloud Computing Environment
M. R. Sheeba1, G. Suganthi2

1M.R.Sheeba*, Registration Number: 17221282162017, Research Scholar, St.Xavier’s College, Affiliated to Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli-627012, India.  
2G.Suganthi, Associate Professor, Women’s Christian College, Nagercoil, India. 
Manuscript received on January 31, 2022. | Revised Manuscript received on February 05, 2022. | Manuscript published on March 30, 2022. | PP: 1-11 | Volume-11, Issue-4, March 2022 | Retrieval Number: 100.1/ijitee.C97640211322 | DOI: 10.35940/ijitee.C9764.0311422
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The Internet of Things (IoT) affords a new paradigm for the expansion of heterogeneous and allotted structures, and it has an increasing number of emerge as a ubiquitous computing carrier platform. IoT has specific sorts of applications, which includes smart home, wearable gadgets, clever linked cars, industries, and clever cities. Therefore, IoT based programs turn out to be the critical elements of our day-to-day lifestyles. However, due to the dearth of adequate computing and garage assets dedicated to the processing and garage of big volumes of the IoT statistics, it tends to undertake a cloud-primarily based structure to address the problems of useful resource constraints. Hence, a series of tough safety issues have arisen in the cloud-based IoT context. So, that during this paper we have proposed a mild weight scheme primarily based on mutual authentication (LWMA–CIoT) to make certain security in IoT based cloud surroundings. This LWMA–CIoT scheme specifically uses identity based encryption to make the scheme as light-weight. The security evaluation shows the effectiveness and significance of the LWMA–CIoT scheme in comparison to the prevailing schemes. 
Keywords: Mutual Authentication, Cloud Computing, IoT Device, Elliptic Curve Cryptography, Hashing.
Scope of the Article: Cloud Computing