ABSTRACT

In 2013, W. Shi and P. Gong designed an Elliptic Curve Cryptography (ECC)-based improved user authentication scheme covering almost all of the loopholes of Yeh et al.’s scheme. In 2018, Li et al. has proposed a secure user authentication ECC-based three factor privacy preservation scheme for Industrial Internet of Things. The cryptanalysis of the Li et al.’s scheme that shows the aforementioned attacks persist in the scheme. The work which became the foundational stone for the authentication protocols was carried out by A. K. Das in 2009. The chapter shows that the scheme is not resilient to User Impersonation Attack, Sensor Node Impersonation Attack, Session Specific Temporary Information Attack, Denial of Service Attack, Replay Attack and Privileged Insider Attack. It reviews Park et al. scheme for mobile commerce environment. The scheme can be divided into four phases, namely, System initialization phase, User registration phase, Mutual authentication and key exchange phase and Password change phase.