2020
DOI: 10.1155/2020/8829319
|View full text |Cite
|
Sign up to set email alerts
|

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Abstract: The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applicati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 66 publications
0
5
0
Order By: Relevance
“…Encryption/decryption is unsuitable for such a resource- and bandwidth-limited environment. At the movement, Shafiq et al [ 20 ] designed an ECC-based lightweight authentication framework for authenticating a user remotely. But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism.…”
Section: Literature Surveymentioning
confidence: 99%
“…Encryption/decryption is unsuitable for such a resource- and bandwidth-limited environment. At the movement, Shafiq et al [ 20 ] designed an ECC-based lightweight authentication framework for authenticating a user remotely. But when an attacker steals the smart card, which is the primary entity in their scheme, they can quickly launch stolen-verifier and ESL attacks on their security mechanism.…”
Section: Literature Surveymentioning
confidence: 99%
“…According to security analysis, IoT-FBAC is a secure procedure, which can prevent over-privileged access. A lightweight identity-based scheme of remote user authentication and key exchange was introduced in (Shafiq et al, 2020) in order to secure internet-connected devices. XOR operations, hash operations and Lightweight elliptic curve cryptography (ECC) are used in the suggested method.…”
Section: Identity Based Authenticationmentioning
confidence: 99%
“…Second, all members in a WSN should authenticate each other before sending data [21,22]. Many authentication protocols have been proposed to overcome these two security issues [23][24][25].…”
Section: Introductionmentioning
confidence: 99%