The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1007/s12652-016-0345-8
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
96
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 127 publications
(97 citation statements)
references
References 32 publications
1
96
0
Order By: Relevance
“…The MDF based fuzzy model has five inputs x 1 , x 2 , x 3 , x 4 , and x 5 and one output y. The rule of MDF based fuzzy model can be defined as if x 1 =a, x 2 =b, x 3 =c, x 4 =d, and x 5 =e, then y=f(x 1 , x 2 , x 3 , x 4 , x 5 ).…”
Section: Parameters Of Mdf Strategymentioning
confidence: 99%
“…The MDF based fuzzy model has five inputs x 1 , x 2 , x 3 , x 4 , and x 5 and one output y. The rule of MDF based fuzzy model can be defined as if x 1 =a, x 2 =b, x 3 =c, x 4 =d, and x 5 =e, then y=f(x 1 , x 2 , x 3 , x 4 , x 5 ).…”
Section: Parameters Of Mdf Strategymentioning
confidence: 99%
“…It prevents from masquerade, man-in-the middle replay attacks [7].Implements ECC based Mutual authentication and capability based access control model to ensure secure authorization. It prevents from man-in-the-middle, Dose, Node capture attack and replay attack [2].Implements authentication system which provides mutual authentication between the users, sensors and gateways with fulfillment of security characteristics of IoT [3].Implements verifiable secret sharing cryptography through signature in6LowPAN environment [8]. Implements object authentication framework to exploit device specification information with normal change in fingerprints for preventing from the different security attack [4].Implements modification in MQTT frame-work's services for reducing the authorization delay, message overhead, etc.…”
Section: IVmentioning
confidence: 99%
“…But the secret keys, like K f h and x , the hash results and the random numbers are difficult to guess. Moreover, it is difficult to obtain the collision of hash results within polynomial time.Assumption According to , we consider that the data in MU's smart card can be obtained once and analyzed by scriptA.Assumption According to , to keep the two‐factor authentication environment, until the data in the smart card are obtained, scriptA can control the public channel, or the insecure channel, with activities such as eavesdropping, intercepting, modifying, and forging messages in it. In many past papers, such as , there is no limitation about the attacker in the model.…”
Section: Preliminariesmentioning
confidence: 99%
“…There are many authentication schemes for various sorts of communications, like key agreement schemes , and signature schemes . For wireless networks, especially in GLOMONETs, researchers have studied a lot about authentication schemes.…”
Section: Introductionmentioning
confidence: 99%