2015
DOI: 10.1007/s10916-015-0360-x
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

Abstract: People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…However, these schemes are susceptible to various security threats and are not considered secure against attacks. In contrast, the author in [12] has proposed an innovative and effective user authentication scheme that has been demonstrated to withstand different attacks, including replay and man-in-the-middle attacks, ensuring enhanced security.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, these schemes are susceptible to various security threats and are not considered secure against attacks. In contrast, the author in [12] has proposed an innovative and effective user authentication scheme that has been demonstrated to withstand different attacks, including replay and man-in-the-middle attacks, ensuring enhanced security.…”
Section: Literature Surveymentioning
confidence: 99%
“…In IoT, almost the communication network uses short number of sensors and also it uses light weight encryption algorithms to encrypt the data [6]. Groce et al [7] proposed the security protocol that can be proved more secure in general model, but it is not suitable to deal with the medical-IoTapplications.In [8], the authors proposed the key evolution approach for preserving the privacy in telemedicine. The similar mechanism was later applied to the body area networks in M-IoT [9].…”
Section: Relaed Workmentioning
confidence: 99%