2020
DOI: 10.1371/journal.pone.0232277
|View full text |Cite|
|
Sign up to set email alerts
|

Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments

Abstract: In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 45 publications
0
25
0
Order By: Relevance
“…Consequently, we focused our discussion of computation overheads during the login and authentication phase. The computational costs are the time consumed by the user and service provider in the process [9]. For computation overheads analysis, we utilized the notations T h and T m to indicate the time complexity of the hash function and elliptic curve cryptography (ECC) algorithm, respectively.…”
Section: Computation Overhead Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, we focused our discussion of computation overheads during the login and authentication phase. The computational costs are the time consumed by the user and service provider in the process [9]. For computation overheads analysis, we utilized the notations T h and T m to indicate the time complexity of the hash function and elliptic curve cryptography (ECC) algorithm, respectively.…”
Section: Computation Overhead Comparisonmentioning
confidence: 99%
“…In an IoT WSNs, remote users can access data from IoT sensor nodes via the Internet. Researchers have developed effective mechanisms to integrate wireless networks into the Internet of things environments [9,10]. Sensor nodes are inherently resourceconstrained devices in terms of limited processing capability, constrained communication bandwidth, and very low storage capacity due to the physical size and limited energy [11].…”
Section: Introductionmentioning
confidence: 99%
“…When the threshold value increases, the storage space required to hoard the keys also increases. To secure the WSNs, several key management schemes have been suggested [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. The symmetric pre-distribution scheme offers security efficiently but not appropriate for the unfriendly environment.…”
Section: Related Workmentioning
confidence: 99%
“…Each of these schemes has its advantages and limitations. The suitable key management scheme should satisfy three important metrics [11][12][13]: security, efficiency, and flexibility.…”
Section: Introductionmentioning
confidence: 99%
“…Using two factors such as [15] which use AES encryption and HMAC and have more saving power compared with ECC algorithm. In [18]based on temporal credentials and dynamic IDs which depend on MAC to secure translate of data. In [20] using ECC and SHA-1 algorithm to mutual authentication between tow IOT devices.…”
Section: Existing Authentication Mechanismsmentioning
confidence: 99%