2020
DOI: 10.1007/978-981-15-3125-5_21
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Burrows-Abadi-Needham logic framework was used to check the reliability of the proposed model in the context of formal security analysis. In [118], Attkan et al proposed a lightweight two-factor authentication scheme for WSN applications to resolve their security concerns particularly associated with the verification and validation of legitimate devices. Wu et al [119] proposed a robust and lightweight two-factor authentication scheme for wireless medical sensor networks (WMSN to guarantee the legitimacy of participating sensor devices in the network.…”
Section: E Cryptography and Non-cryptography Based Solutionsmentioning
confidence: 99%
“…Burrows-Abadi-Needham logic framework was used to check the reliability of the proposed model in the context of formal security analysis. In [118], Attkan et al proposed a lightweight two-factor authentication scheme for WSN applications to resolve their security concerns particularly associated with the verification and validation of legitimate devices. Wu et al [119] proposed a robust and lightweight two-factor authentication scheme for wireless medical sensor networks (WMSN to guarantee the legitimacy of participating sensor devices in the network.…”
Section: E Cryptography and Non-cryptography Based Solutionsmentioning
confidence: 99%
“…Due to the energy and computation constrained nature of WSN, lightweight cryptographic schemes need to be implemented [29]. The paper [30] proposed a secure lightweight hash-based node verification protocol. Later, it has been found that the algorithm is vulnerable to DDOS attacks.…”
Section: IImentioning
confidence: 99%
“…Therefore, their protocol can decrease the communication cost. Many authors have used the elliptic curve cryptography (ECC) method to design protocol, [30][31][32][33] but the keys' size and complexity in computations of this method cannot be appropriate for the limited sensors. In 2019, Sureshkumar et al 34 proposed a lightweight authentication protocol for smart vehicle communication in smart cities as an application of IoT by using fog and cloud servers to reduce communication and computation costs.…”
Section: Related Workmentioning
confidence: 99%