2018
DOI: 10.1007/s11276-018-1828-7
|View full text |Cite
|
Sign up to set email alerts
|

Authentication scheme based on smart card in multi-server environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Zhou et al, [27], discussed a bio-metric-based authentication scheme. Due to the use of bilinear pairing and modular exponentiation operations, it suffers from excessive computation and communication overhead.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhou et al, [27], discussed a bio-metric-based authentication scheme. Due to the use of bilinear pairing and modular exponentiation operations, it suffers from excessive computation and communication overhead.…”
Section: Related Workmentioning
confidence: 99%
“…session will be terminated if any verification remains unsuccessful. In addition, the integrity checks of the transmitted numbers n 1 and n 2 are also performed during verification of V 1 and V 2 , respectively (in contrast to [27]). On successful authentication, U i and S j individually compute sk = h(R u ‖n 1 ��n 2 ) .…”
Section: Informal Verificationmentioning
confidence: 99%
“…In addition, some of the existing schemes have drawbacks in terms of performance. Sharma and Kalra [28] proposed a remote user authentication scheme in the cloud environment, but the scheme fails to realize clock synchronization and time error detection [29].Wang et al [30] analyzed the two-factor authentication schemes of [31], [32] for multi-server environment, and proved that these schemes have some security defects, which would make them invalid in practical applications without further improvement. It can be seen that the aforementioned schemes all have security vulnerabilities.…”
Section: Intra-domain Identity Authenticationmentioning
confidence: 99%
“…Edge nodes could also serve as trusted gateways, adding new IIoT devices, removing existing ones, and being responsible for re-keying. Some existing works have detailed devices with the required authentication ability through various types of servers, including NFC tags [228][229][230], smart cards [231][232][233], RFID tags [234][235][236][237][238], and biometric traits [239][240][241]. Edge nodes could become a substitute for such a server, and may be attached to sensors, acting as proxies for sensor measurements.…”
Section: Authentication and Access Controlmentioning
confidence: 99%