2021
DOI: 10.1109/access.2021.3111443
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes

Abstract: Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and anywhere. However, smart home environments are vulnerable to security attacks because an attacker can inject, insert, intercept, delete, and modify transmitted messages over an insecure channel. Thus, secure and lightweight authentication protocols are essential to ensure useful services in smart home environments. In 2021, Kaur and Kumar presented a two-factor … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(46 citation statements)
references
References 42 publications
0
46
0
Order By: Relevance
“…The communication cost of our scheme for the message sent from the gateway to the smart device is 544 bits (68 bytes) (128 + 128 + 128 + 160 = 544). Similarly, the communication costs of the existing protocols proposed by Wazid et al [21] is 986 bits, Yu et al [40] is 794 bits, Challa et al [36] is 711 bits and Shuai et al [24] is 960 bits. Table 5 shows the communication overhead at the smart device, which includes the number of messages received and sent and the total cost in bits.…”
Section: ) Comparison Of Communication Overheadmentioning
confidence: 99%
See 2 more Smart Citations
“…The communication cost of our scheme for the message sent from the gateway to the smart device is 544 bits (68 bytes) (128 + 128 + 128 + 160 = 544). Similarly, the communication costs of the existing protocols proposed by Wazid et al [21] is 986 bits, Yu et al [40] is 794 bits, Challa et al [36] is 711 bits and Shuai et al [24] is 960 bits. Table 5 shows the communication overhead at the smart device, which includes the number of messages received and sent and the total cost in bits.…”
Section: ) Comparison Of Communication Overheadmentioning
confidence: 99%
“…Public key based authentication protocols [22], [36]- [39] are computationally expensive than symmetric key based approaches. Besides, almost all of the existing schemes are designed using timestamps, making them vulnerable to clock synchronization problems [21], [32], [36], [40]. In particular, IoT devices are more prone to such problems as they are deployed in a broad range of operating conditions and are resource-constrained [41].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The design supports end-users by allowing for demand-side management and automation. In [50], the authors developed a secured but lightweight three-factor driven privacy-preserving authentication model specifically for IoT-enabled smart home environments. The authors [51], presented a scheme that automates home appliances in three modes viz: local, web, and app-based automation.…”
Section: Summary Of Related Work (Automated Home)mentioning
confidence: 99%
“…Biometric locks [28] are vulnerable to biometric cloning. Smart locks [29] do not have user-defined keys or support biometric authentication. There are locks that allow resettable keys for better security [30],however, to reset this type of a lock, the previous key is needed.…”
Section: A Proposed Solution and Novelty Of Lokimentioning
confidence: 99%