Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1109/access.2022.3191419
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments

Abstract: In electronic governance (e-governance) system, citizens can access government services such as transportation, licensing and immigration remotely over the Internet. With the development of information and communication technology, usage of the e-governance system has been increased. To efficiently provide citizens with various e-governance services, multi-server environments can be applied to the e-governance system. However, messages can be inserted, deleted, and modified by a malicious adversary since these… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 45 publications
(72 reference statements)
0
16
0
Order By: Relevance
“…This research paper [29] presents a secure three-factor mutual authentication protocol for e-governance systems in multi-server environments. The proposed protocol aims to address the vulnerabilities of a previously proposed smart card-based authentication protocol, including resistance to smart card theft, insider attacks, man-in-the-middle attacks, user impersonation, and session key disclosure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This research paper [29] presents a secure three-factor mutual authentication protocol for e-governance systems in multi-server environments. The proposed protocol aims to address the vulnerabilities of a previously proposed smart card-based authentication protocol, including resistance to smart card theft, insider attacks, man-in-the-middle attacks, user impersonation, and session key disclosure.…”
Section: Related Workmentioning
confidence: 99%
“…The potential benefits of this approach [29] to addressing the vulnerabilities of mobile 2FA applications include increased security and resource-rich environment provided by offloading to the cloud. This can potentially reduce the risk of compromise for mobile 2FA applications and improve the overall security of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Protocols 35,41 fails to preserve users identity and protocols 37,41,42,45,46 are prone to user traceability. Protocols 35,36,[42][43][44] are prone to replay attack and protocols 39,40,42 are vulnerable to insider attack. Protocols 35,37 are prone to KSSTI attack and protocols 39,41 fails to provide forward secrecy.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…• We compare the effectiveness of our protocol with Bouchaala et al, 35 Kaur et al, 36 Dharminder et al's 37 and other existing relevant protocols [39][40][41][42][43][44][45][46] in terms of security attributes, communication, and computational overheads.…”
Section: Motivations and Contributionmentioning
confidence: 99%
“…The ROR model is widely used to prove the security of session keys of various authentication protocols [42]- [44].…”
Section: Formal Security Analysis Using Ror Modelmentioning
confidence: 99%