2022
DOI: 10.1109/access.2022.3146393
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network

Abstract: Wireless sensor network has been widely used and plays a vital role in the Internet of Things, smart cities, military, and other fields, and its security has also attracted the attention of many researchers. In view of the security defects in Shin and Kwon's scheme such as failure to provide three-factor security, lack of anonymity and untraceability, user impersonation attack, desynchronization attack and privileged insider attack, we suggest an improved provably secure three-factor user authentication scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 64 publications
0
5
0
Order By: Relevance
“…WSNs focus on the computational overhead of resource-constrained sensor nodes. The computational overhead of the sensor nodes is increased only once compared to schemes 6 , 39 , and 40 , which also have point multiplication operations. This scheme does not put too much pressure on sensor computation.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…WSNs focus on the computational overhead of resource-constrained sensor nodes. The computational overhead of the sensor nodes is increased only once compared to schemes 6 , 39 , and 40 , which also have point multiplication operations. This scheme does not put too much pressure on sensor computation.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…This scheme is based on ECC, and as the communication process needs to send each party’s public key several times, the communication overhead is slightly higher than with other schemes. For the communication overhead of resource-constrained sensor nodes, this scheme is the same as scheme 39 and slightly higher than schemes 6 , 16 and 40 , but still within the tolerance range of sensor nodes and suitable for WSNs.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…This work aims to formally verify a multi-factor authentication mechanism with a Reputation (MFA_R) [14] despite the existence of many security protocol analysis programs, such as ProVerif (https://bplanche.gitlabpages.inria.fr/proverif/-accessed on 1 July 2023) an automatic security protocol verification tool that includes secrecy, strong secrecy, and authentication checks, among others. Through recent studies [15,16], it was noted that this tool is currently widely accepted in the research area, AVISPA (http://www.avispa-project. org/-accessed on 1 July 2023) a tool for formal validation of security protocols and systems that provides performance and scalability [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…This work aims to formally verify a multi-factor authentication mechanism with a Reputation (MFA_R) [ 14 ] despite the existence of many security protocol analysis programs, such as ProVerif ( —accessed on 1 July 2023) an automatic security protocol verification tool that includes secrecy, strong secrecy, and authentication checks, among others. Through recent studies [ 15 , 16 ], it was noted that this tool is currently widely accepted in the research area, AVISPA ( —accessed on 1 July 2023) a tool for formal validation of security protocols and systems that provides performance and scalability [ 17 , 18 ]. Its use in authentication [ 19 , 20 ] and in IoT [ 21 , 22 ] is significant, as it is in Tamarin Prover ( —accessed on 1 July 2023) a verification tool where cryptographic protocols support first-order logic), and it has a growing number of publications in the area [ 23 , 24 , 25 , 26 , 27 ].…”
Section: Introductionmentioning
confidence: 99%
“…We can also observe the rapid development of communication between devices that make up the Internet of Things or Wireless Sensor Networks. Such networks connect various devices and sensors to exchange information between the devices and between them and other networks, nodes used to process and store data [1][2][3].…”
Section: Introductionmentioning
confidence: 99%