2019
DOI: 10.1080/09720529.2019.1627072
|View full text |Cite
|
Sign up to set email alerts
|

A secure three-factor authentication scheme for wireless sensor networks using ECC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…The Eqs. (17), (18) and (19) hold owing to Interpretation Rule I R1 , I R2 , I R5 and BAN Logic Assumption ⟨A⟩ 1 , ⟨A⟩ 2 and ⟨A⟩ 5 . Therefore, the proposed S-USI scheme has:…”
Section: Security Goalsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Eqs. (17), (18) and (19) hold owing to Interpretation Rule I R1 , I R2 , I R5 and BAN Logic Assumption ⟨A⟩ 1 , ⟨A⟩ 2 and ⟨A⟩ 5 . Therefore, the proposed S-USI scheme has:…”
Section: Security Goalsmentioning
confidence: 99%
“…Therefore, the recent authentication mechanisms have constructed a strategy of control access using advanced mobile computing systems. Of late, three-party authentication and key agreement schemes have been proposed for WMSNs using a smartcard [18,19]. The design objectives of their system were to provide an effective security mechanism in WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…In user registration phase of our proposed scheme, the U i sends its identity to GwN. 4 shows the communicational costs comparisons with Kumari and Renuka's scheme, 7 Kumari and Renuka's scheme, 7 Zhang et al's scheme, 13 Kumar et al's scheme, 14 Song et al's scheme, 15 and Soni et al's scheme 16 from user registration phase, sensor node registration phase, and AKA phase. To highlight our scheme's communication advantage, we summarize three phases' communication cost of each scheme for a overall comparison, which is shown in Figure 6.…”
Section: Communication Costs Comparisonmentioning
confidence: 99%
“…• The performance evaluation shows that the proposed scheme yields lower communication cost and computation cost compared with Kumari and Renuka's scheme, 7 Zhang et al's, 13 Kumar et al's scheme, 14 Song et al's scheme, 15 and Soni et al's scheme. 16 Organization of the rest article.…”
mentioning
confidence: 93%
See 1 more Smart Citation