2019 International Conference on Communication Technologies (ComTech) 2019
DOI: 10.1109/comtech.2019.8737799
|View full text |Cite
|
Sign up to set email alerts
|

An Improved three-factor anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…By doing so, the supervisor node may verify that the data it got came from a trusted sensor node and not an unauthorized one, preventing the introduction of dangerous data into the networks. In addition, it indicates that the sensor node's authenticity has been confirmed and it has been allowed access to the WSN [43].…”
Section: Protocol-specific Attacksmentioning
confidence: 99%
“…By doing so, the supervisor node may verify that the data it got came from a trusted sensor node and not an unauthorized one, preventing the introduction of dangerous data into the networks. In addition, it indicates that the sensor node's authenticity has been confirmed and it has been allowed access to the WSN [43].…”
Section: Protocol-specific Attacksmentioning
confidence: 99%
“…Besides, Jawad et al. [21] studied Li et al.’s scheme [19] and pointed out that this scheme cannot defend stolen smart card attacks and also has user anonymity and traceability issues. The authors alleviated these problems using symmetric key cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, [58] studies developed WSN middleware to provide a secure end-to-end system, which significantly decreased power consumption. b) Improved authentication schemes are analyzed [59] through an improved scheme based on symmetric cryptography for IoT systems that integrated WSNs. Protocol minimizes spoofing, phishing, man-in-themiddle, desynchronization, and mutual authentication attacks.…”
Section: Trends and Future Lines Of Workmentioning
confidence: 99%