2020
DOI: 10.1109/access.2020.2985719
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

Abstract: Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT's communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to allow IoT to penetrate deeply into our daily lives and to provide various services that are convenient, but at the same time, it also brings new security threats. From this aspect, user authentication and key agreement a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(73 citation statements)
references
References 39 publications
0
62
0
Order By: Relevance
“…In addition, Shin et al [113] designed a privacy-preserving authentication scheme for wireless sensor networks in 5Gintegrated IoT, which the IoT architecture is based on a wireless sensor network, gateways, cloud computing, and with three types of layers, including, network layer, application layer, and support layer. The Shin et al's scheme uses elliptic curve cryptography to guarantees gateway anonymity, user anonymity with untraceability, and resistant to four types of attacks, including, offline password guessing attacks, mobile device loss attacks, stolen verifier attacks, and user impersonation attacks.…”
Section: A Authentication and Access Controlmentioning
confidence: 99%
“…In addition, Shin et al [113] designed a privacy-preserving authentication scheme for wireless sensor networks in 5Gintegrated IoT, which the IoT architecture is based on a wireless sensor network, gateways, cloud computing, and with three types of layers, including, network layer, application layer, and support layer. The Shin et al's scheme uses elliptic curve cryptography to guarantees gateway anonymity, user anonymity with untraceability, and resistant to four types of attacks, including, offline password guessing attacks, mobile device loss attacks, stolen verifier attacks, and user impersonation attacks.…”
Section: A Authentication and Access Controlmentioning
confidence: 99%
“…Most modern proposals employ, as almost every recent cryptographic technique, asymmetric encryption, and signature [13] [42]. Nevertheless, no information is provided about how these complex and precise mathematical algorithms may be implemented using low cost and resource constrained computing nodes.…”
Section: State Of the Artmentioning
confidence: 99%
“…Being , the i-th watermark introduced in the j-th captured packet by the attacker and , the i-th encrypted message in the j-th captured packet by the attacker, the logic rule representing the success of a privacy adversary is easy to develop (42). In that way, results from PRISM are directly a formal security validation.…”
Section: A Formal Verificationmentioning
confidence: 99%
“…Authorization: Authorization ensures that users or devices are permitted to access the services and resources of the IoT ecosystem. Session fixation and session hijacking are the most commonly used techniques to access the un-authorized services and resources [271] [272].…”
Section: ) Access Levelmentioning
confidence: 99%