2019
DOI: 10.3390/s19092012
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes

Abstract: A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance. However, despite its convenience and potential benefits, there are concerns about various security threats that may infringe on privacy and threaten our home life. For protecting WSNs for smart homes from those threats, authentication and key agreement are basic security requirements. There have been a large number of p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

2
73
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 59 publications
(75 citation statements)
references
References 32 publications
2
73
0
Order By: Relevance
“…Since Das et al introduced a two-factor user authentication scheme for WSNs [2], a large number of two-factor user authentication schemes using passwords and smart cards have been proposed [3]- [8]. To address the security vulnerabilities associated with two-factor user authentication schemes and to improve their security strength, three-factor authentication, with biometrics as the third factor, has attracted attention from many researchers in recent years [9]- [16].…”
Section: A Related Workmentioning
confidence: 99%
“…Since Das et al introduced a two-factor user authentication scheme for WSNs [2], a large number of two-factor user authentication schemes using passwords and smart cards have been proposed [3]- [8]. To address the security vulnerabilities associated with two-factor user authentication schemes and to improve their security strength, three-factor authentication, with biometrics as the third factor, has attracted attention from many researchers in recent years [9]- [16].…”
Section: A Related Workmentioning
confidence: 99%
“…In such circumstances, cryptographic methods should be employed to preserve user privacy and wireless devices against various attacks. The authors of [6] analyze the security vulnerabilities in modern three-factor authentication and key agreement schemes. They introduce a system model for smart homes based on wireless devices in which a secure and lightweight three-factor authentication and key agreement scheme are employed.…”
Section: A Review Of the Contributions In This Special Issuementioning
confidence: 99%
“…After analyzing some existing three-factor authentication protocols, [17][18][19][20][21][22][23][24][25] we find that the following problems still exist:…”
mentioning
confidence: 99%
“…25 • The research on privacy protection is not enough. 17,18,24 It is necessary to consider the protection of biometric and user anonymity. If the designed protocol is to be recognized by users, the complete privacy protection is essential.…”
mentioning
confidence: 99%
See 1 more Smart Citation