2022
DOI: 10.1016/j.jksuci.2021.07.023
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight three factor authentication framework for IoT based critical applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(46 citation statements)
references
References 45 publications
0
46
0
Order By: Relevance
“…IoT is an emerging heterogeneous network industry, and 41 billion IoT devices will be connected to the Internet worldwide. Tese devices will generate 79 Zettabytes of data annually [1].…”
Section: Introductionmentioning
confidence: 99%
“…IoT is an emerging heterogeneous network industry, and 41 billion IoT devices will be connected to the Internet worldwide. Tese devices will generate 79 Zettabytes of data annually [1].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, Fakroon et al proposed a hashbased user authentication scheme utilizing physical context awareness and transaction history. Although their scheme [19] achieves an efficient computational cost, they suffer from a variety of security attacks, including offline password guessing and insider attacks [20].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, a user authentication protocol has been proposed in [40] to address these issues. On the other hand, the scheme based on identity, password, and digital signatures is developed in [41]. However, it is based on PKI, which requires entities to maintain a pair of private and public keys, which increases its computation and communication complexities [42].…”
Section: Related Workmentioning
confidence: 99%
“…However, it is based on PKI, which requires entities to maintain a pair of private and public keys, which increases its computation and communication complexities [42]. The protocols in [43][44][45] are efficient and can solve the problems in [41].However, the scheme in [43] cannot withstand de-synchronization attacks. In addition, it utilizes verification tables during authentication, which are susceptible to stolen verifier attacks [40].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation