2021
DOI: 10.1109/jiot.2020.3024703
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 102 publications
(62 citation statements)
references
References 55 publications
0
62
0
Order By: Relevance
“…In this section, we first revisit Vinoth et al's scheme [8] briefly and list some intuitive notations and abbreviates in Table 1 for the convenience of description. eir scheme includes six phases, while we only review the first three phases, which are related to our proposed attacks.…”
Section: Revisiting Vinoth Et Al's Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we first revisit Vinoth et al's scheme [8] briefly and list some intuitive notations and abbreviates in Table 1 for the convenience of description. eir scheme includes six phases, while we only review the first three phases, which are related to our proposed attacks.…”
Section: Revisiting Vinoth Et Al's Schemementioning
confidence: 99%
“…Recently, Vinoth et al [8] proposed a multifactor authenticated key agreement scheme for the IIoT environment, aiming to support the authorized user remotely accessing multiple sensing devices. ey claimed that their scheme is suitable for the resource-constrained IIoT and has less cost during communication and computation processes.…”
Section: Introductionmentioning
confidence: 99%
“…As shown in [8], the authors' security analysis does not mention or refer to IF3, IF5, IF7, and IF14. From [47], we know that [48] cannot resist reply and sensor node capture attacks. As shown in [47], the authors' security analysis does not mention or refer to IF2, IF11, and IF12.…”
Section: Security Comparisonmentioning
confidence: 99%
“…Real-or-Random (ROR) model [10,18,19] is used to prove semantic security of the proposed protocol and to obtain session key security (SK-security), as shown in theorem 1. . If and have similar session IDs in accepted state that are directly linked to each other and complete a successful session, they will establish a partnership, one being the initiator and the other responder.…”
Section: Security Proofmentioning
confidence: 99%