2022
DOI: 10.1016/j.iot.2021.100493
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(29 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…Xie et al [98], Kou et al [99], Butt et al [100], Yu et Park [103], [106], [112], Hajian et al [115], and Yadav et al [119] presented three-factor protocols that use the fuzzy extractor to extract numerical variables from user biometric information, random numbers, and hash functions. The difference between these protocols is that [99], [103], and [112] are based on encryption and decryption algorithms, [98], [106], [115], and [122] are based on ECC, however [100] and [119] [103] and [112] used AVISPA, and [106] and Hajian et al [115] used Scyther to make a formal analysis of their schemes.…”
Section: Comparison Of the Studied Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Xie et al [98], Kou et al [99], Butt et al [100], Yu et Park [103], [106], [112], Hajian et al [115], and Yadav et al [119] presented three-factor protocols that use the fuzzy extractor to extract numerical variables from user biometric information, random numbers, and hash functions. The difference between these protocols is that [99], [103], and [112] are based on encryption and decryption algorithms, [98], [106], [115], and [122] are based on ECC, however [100] and [119] [103] and [112] used AVISPA, and [106] and Hajian et al [115] used Scyther to make a formal analysis of their schemes.…”
Section: Comparison Of the Studied Protocolsmentioning
confidence: 99%
“…Moreover, the key secret that maintains sensitive data secret. As it is clear from Table 2, the schemes [91], [93], [94], [101]- [105], [115], [118], [120], and [125] are the most effective protocols ensuring all security features, then the protocols [95], [97], [98], [106], [107], [111], [113], [116], [117], [119], [122], and [123] which do not ensure the key secret, and [108], [109] that do not ensure the perfect forward secrecy. However, scheme [112] secures mutual authentication, anonymity, intractability, and key agreement, and scheme [121] secures mutual authentication, anonymity, key agreement, and perfect forward secrecy.…”
Section: Security Servicesmentioning
confidence: 99%
“…Chien [33] uses the ECC encryption and double hash approach to resist anonymity attacks and also preserves the synchronizing pseudonyms. Hajian et al [34] proposed a security scheme that improves the previous approaches but lacks anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…The other is a two-party authentication protocol for IoT, proposed by Alzahrani et al [ 24 ]. It can be stated that these two works have security flaws [ 25 ]. We will compare our protocol with these works [ 20 , 21 , 22 ] with regard to performance and security in Section 6 .…”
Section: Related Workmentioning
confidence: 99%