2021
DOI: 10.1186/s13638-021-02000-7
|View full text |Cite
|
Sign up to set email alerts
|

A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

Abstract: Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart healthcare and smart energy. However, security and privacy are the biggest challenges for WSN. Recently, Banerjee et al. proposed a security-enhanced authentication and key agreement scheme for WSN, but their scheme cannot resist offline password guessing attack, imper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(32 citation statements)
references
References 30 publications
0
32
0
Order By: Relevance
“…A study of the best security practices was performed, and several mechanisms were implemented to secure the data generated by the SmartWalk app during communications and at rest, which are in line with solutions reported in the literature aiming to protect personal data of other types of smart city applications [68][69][70]. Moreover, an analysis of the implemented security mechanism was performed, and it was possible to conclude that the usage of different security technologies provides a framework that mitigates threats and guarantees the privacy, integrity, and confidentiality of personal data.…”
Section: Discussionmentioning
confidence: 83%
“…A study of the best security practices was performed, and several mechanisms were implemented to secure the data generated by the SmartWalk app during communications and at rest, which are in line with solutions reported in the literature aiming to protect personal data of other types of smart city applications [68][69][70]. Moreover, an analysis of the implemented security mechanism was performed, and it was possible to conclude that the usage of different security technologies provides a framework that mitigates threats and guarantees the privacy, integrity, and confidentiality of personal data.…”
Section: Discussionmentioning
confidence: 83%
“…However, it is vulnerable to offline password guessing assaults, impersonation attacks, and session key secrecy is not completed. Xie et al 16 propose an ECC and Fuzzy extractor-based scheme that can resist offline password guessing attacks and impersonation attacks but does not achieve session key secrecy or perfect forward secrecy. Other works 17,18 have also proposed various methods based on authentication schemes in IoT-enabled WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the proposed technique can only handle specific security threats. 16 Several other papers, such as References [12,21,22], also discuss authentication schemes based on 3FAS in IoT enabled WSNs. While these schemes provide anonymity, forward secrecy, and resistance to multiple attacks, they are vulnerable to stolen-verifier attacks and de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [ 235 ], Xie et al solved the flaws of the framework of Banerjee et al [ 236 ]. This work covers the communication between the sensor and the user via a gateway, but the communication to the server is absent here.…”
Section: Iot Security Solutionsmentioning
confidence: 99%