2023
DOI: 10.1109/tii.2022.3194956
|View full text |Cite
|
Sign up to set email alerts
|

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices

Abstract: Several symmetric and asymmetric encryption based authentication protocols have been developed for the Wireless Local Area Networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight Extensible Authentication Protocol (EAP)-based authentication protocol for WLAN-connected IoT devices is presented. We conduct an informal and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 30 publications
(167 reference statements)
0
1
0
Order By: Relevance
“…Kaurl et al [94], Dammak et al [97], Yadav et al [107], and Rostampour et al [111] provided four dual-factor authentication protocols built on encryption and decryption algorithms, random numbers, and hash functions. The formal analysis of the schemes provided by Kaurl et al [94] was carried out using the ProVerif simulator, as these of Yadav et al's protocol [107] and Rostampour et al's protocol [111] were carried out using Scyther.…”
Section: Comparison Of the Studied Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…Kaurl et al [94], Dammak et al [97], Yadav et al [107], and Rostampour et al [111] provided four dual-factor authentication protocols built on encryption and decryption algorithms, random numbers, and hash functions. The formal analysis of the schemes provided by Kaurl et al [94] was carried out using the ProVerif simulator, as these of Yadav et al's protocol [107] and Rostampour et al's protocol [111] were carried out using Scyther.…”
Section: Comparison Of the Studied Protocolsmentioning
confidence: 99%
“…Moreover, the key secret that maintains sensitive data secret. As it is clear from Table 2, the schemes [91], [93], [94], [101]- [105], [115], [118], [120], and [125] are the most effective protocols ensuring all security features, then the protocols [95], [97], [98], [106], [107], [111], [113], [116], [117], [119], [122], and [123] which do not ensure the key secret, and [108], [109] that do not ensure the perfect forward secrecy. However, scheme [112] secures mutual authentication, anonymity, intractability, and key agreement, and scheme [121] secures mutual authentication, anonymity, key agreement, and perfect forward secrecy.…”
Section: Security Servicesmentioning
confidence: 99%
See 2 more Smart Citations
“…The authentication followed is a group authenticated key agreement protocol is utilized (5G-AKA). If and when the number of IoT device load gets increased there will be a computational 27 proposed a lightweight extensible authentication protocol (EAP) designed for Internet of Things environment. The scheme suffers computation overhead across unidentified attacks.…”
Section: Schemes Base On Generic Authentixcationmentioning
confidence: 99%