2019
DOI: 10.1016/j.adhoc.2019.101965
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 24 publications
0
26
0
Order By: Relevance
“…We have presented our method using relatively simple protocols however, new, more complex protocols have been proposed for securing sensor devices communication [ 44 , 45 ]. Now we plan to take into account and investigate more complex systems.…”
Section: Discussionmentioning
confidence: 99%
“…We have presented our method using relatively simple protocols however, new, more complex protocols have been proposed for securing sensor devices communication [ 44 , 45 ]. Now we plan to take into account and investigate more complex systems.…”
Section: Discussionmentioning
confidence: 99%
“…In the last few decades, numerous authentication protocols have been proposed to provide user privacy in the WSN environment [20][21][22][23][24][25]. In 1981, Lamport [26] presented the password-based authentication protocol using a single factor to provide user privacy and anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…However, their scheme was also revealed to vulnerability to sensor node capture attack and nonsupport for user anonymity. In 2019, Guo et al [22] found that the scheme designed by Wu et al [20] could not resist to stolen smart card attack and session key reveal attack. In order to address these drawbacks, Guo et al [22] presented a new scheme based on biometric features.…”
Section: Introductionmentioning
confidence: 99%
“…In 2019, Guo et al [22] found that the scheme designed by Wu et al [20] could not resist to stolen smart card attack and session key reveal attack. In order to address these drawbacks, Guo et al [22] presented a new scheme based on biometric features. Recently, Vinoth et al [23] proposed a secure multifactor authentication key agreement scheme for industrial IoT, which was insecure as they claimed.…”
Section: Introductionmentioning
confidence: 99%