2020
DOI: 10.3390/s20041215
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments

Abstract: In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authenticatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
52
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 56 publications
(52 citation statements)
references
References 33 publications
0
52
0
Order By: Relevance
“…Recently, several lightweight authentication protocols [ 6 , 38 ] have been proposed for smart home environments to solve these problems. Banerjee et al [ 38 ] presented an anonymous and robust authentication protocol for IoT-based smart homes using one-way hash functions, XOR operations, and a fuzzy extractor. Banerjee et al [ 38 ] proved that their protocol resists various attacks.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Recently, several lightweight authentication protocols [ 6 , 38 ] have been proposed for smart home environments to solve these problems. Banerjee et al [ 38 ] presented an anonymous and robust authentication protocol for IoT-based smart homes using one-way hash functions, XOR operations, and a fuzzy extractor. Banerjee et al [ 38 ] proved that their protocol resists various attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Banerjee et al [ 38 ] presented an anonymous and robust authentication protocol for IoT-based smart homes using one-way hash functions, XOR operations, and a fuzzy extractor. Banerjee et al [ 38 ] proved that their protocol resists various attacks. However, AL-Turjman and Deebak [ 39 ] pointed out that Banerjee et al’s protocol [ 38 ] does not provide identity protection, traceability, or session secret key agreement.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations