The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1016/j.jnca.2016.12.008
|View full text |Cite
|
Sign up to set email alerts
|

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 154 publications
(97 citation statements)
references
References 44 publications
0
97
0
Order By: Relevance
“…Therefore, we use informal and heuristic manner to analyze the security of the proposed scheme. We note that such a manner is widely accepted and used in the literature of multifactor authentication scheme [15,20,24,33,36,38,39,51]. Specifically, we show that our scheme can resist various well-known attacks, including replay attack, impersonation attack, offline password guessing attack, and known-key attack.…”
Section: Security Analysismentioning
confidence: 74%
See 1 more Smart Citation
“…Therefore, we use informal and heuristic manner to analyze the security of the proposed scheme. We note that such a manner is widely accepted and used in the literature of multifactor authentication scheme [15,20,24,33,36,38,39,51]. Specifically, we show that our scheme can resist various well-known attacks, including replay attack, impersonation attack, offline password guessing attack, and known-key attack.…”
Section: Security Analysismentioning
confidence: 74%
“…To enhance the security of password-based authentication scheme, Chang and Wu [18] introduced password and smart card based two-factor remote user authentication scheme. Since then, a number of such schemes [19][20][21][22][23][24][25][26][27] have been proposed to improve the security and efficiency of this kind of authentication scheme. In general, these schemes fall into two types, i.e., using static identity or dynamic identity.…”
Section: Introductionmentioning
confidence: 99%
“…Proverif is an automatic cryptographic protocol verifier, which is widely used to specify and analyze the security of authenticated key agreement protocols [19][20][21][22][23].…”
Section: Simulation Verification Using a Proverif Toolmentioning
confidence: 99%
“…It is also certain that there is a need for an authentication server to verify and keep a check on all the authentications. At the same time, there must exist other equally secure ways of authentication so that the network can function even if the authentication server is unreachable [26,27]. A similar approach that implements hybrid authentication is presented in [22] which, discusses a multi-level model for authentication.…”
Section: Related Workmentioning
confidence: 99%