2021
DOI: 10.1155/2021/8871204
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications

Abstract: With the booming integration of IoT technology in our daily life applications such as smart industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the security and privacy challenges of these systems. Furthermore, time-critical IoT applications in healthcare require access from external parties (users) to their real-time private information via wireless communication devices. Therefore, challenges such as user authentication must be addressed in IoT wireless sensor networks (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 60 publications
(99 reference statements)
0
4
0
Order By: Relevance
“…But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism. Taher et al [ 21 ] proposed a three-factor authentication scheme for a remote user for IoT using WSN. They used AVISPA for simulation, BAN logic for hash code security checking, and fingerprint for additional security.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism. Taher et al [ 21 ] proposed a three-factor authentication scheme for a remote user for IoT using WSN. They used AVISPA for simulation, BAN logic for hash code security checking, and fingerprint for additional security.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this section, the security of the proposed protocol can be analyzed using the random oracle model (ROM) [35] and ProVerif2.03 [36], which is also used by [18,21,26,28,30]. These are described one by one as follows:…”
Section: Security Analysismentioning
confidence: 99%
“…Recently used distributed techniques is self-organization. The process of forwarding information is complex and hence robust techniques are required [6]. The network with this strategy achieves a promising behavior where nodes individually communicate and coordinate independently.…”
Section: Introductionmentioning
confidence: 99%
“…The study [16] proposes lightweight 3FA for WSN for healthcare remote user IoT application, based on hash, and XOR includes features of biometrics, smart devices and user password, session key, and mutual authentication. Protocol 3 Journal of Sensors is based on BAN logic and formal verified on AVISPA tool, reduces the communication and computation overhead.…”
Section: Introductionmentioning
confidence: 99%