2021
DOI: 10.1155/2021/8871204
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications

Abstract: With the booming integration of IoT technology in our daily life applications such as smart industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the security and privacy challenges of these systems. Furthermore, time-critical IoT applications in healthcare require access from external parties (users) to their real-time private information via wireless communication devices. Therefore, challenges such as user authentication must be addressed in IoT wireless sensor networks (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 61 publications
0
6
0
Order By: Relevance
“…But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism. Taher et al [ 21 ] proposed a three-factor authentication scheme for a remote user for IoT using WSN. They used AVISPA for simulation, BAN logic for hash code security checking, and fingerprint for additional security.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism. Taher et al [ 21 ] proposed a three-factor authentication scheme for a remote user for IoT using WSN. They used AVISPA for simulation, BAN logic for hash code security checking, and fingerprint for additional security.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this section, the security of the proposed protocol can be analyzed using the random oracle model (ROM) [35] and ProVerif2.03 [36], which is also used by [18,21,26,28,30]. These are described one by one as follows:…”
Section: Security Analysismentioning
confidence: 99%
“…Many security techniques have been developed over the recent past to offer security protection in IoT and other devices interconnected in smart cities 27 – 31 . However, these schemes have extensive communication and computation overheads 32 . Although the protocol in 33 is lightweight and hence can address this issue, it cannot withstand outsider attackers 34 .…”
Section: Related Workmentioning
confidence: 99%
“…Recently used distributed techniques is self-organization. The process of forwarding information is complex and hence robust techniques are required [6]. The network with this strategy achieves a promising behavior where nodes individually communicate and coordinate independently.…”
Section: Introductionmentioning
confidence: 99%