2020
DOI: 10.1109/jiot.2020.2966242
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 111 publications
(39 citation statements)
references
References 30 publications
0
39
0
Order By: Relevance
“…We utilized the AVISPA tool [ 7 , 8 , 9 ] to verify the security of our protocol against MITM and replay attacks. The AVISPA tool uses a role based language, High-Level Protocols Specification Language (HLPSL), to specify actions of each protocol participant [ 45 ].…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…We utilized the AVISPA tool [ 7 , 8 , 9 ] to verify the security of our protocol against MITM and replay attacks. The AVISPA tool uses a role based language, High-Level Protocols Specification Language (HLPSL), to specify actions of each protocol participant [ 45 ].…”
Section: Security Analysismentioning
confidence: 99%
“…We conducted formal analysis using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool [ 7 , 8 , 9 ], Burrows–Abadi–Needham (BAN) logic [ 10 ], and the real or random (ROR) model [ 11 ]. With the formal analysis, we proved secure mutual authentication, the session key security, and the resistance against MITM and replay attacks of our protocol.…”
Section: Introductionmentioning
confidence: 99%
“…In the process of our proof, we take advantage of the method, which is used in previous studies. [61][62][63][64] In the following, we explain some of the preliminaries that we used during our proof.…”
Section: Formal Security Analysis Under Ro Modelmentioning
confidence: 99%
“…Inspired by [37], Gagne et al [38] proposed an ABSC scheme by using a threshold access strategy, in which users must determine their access structure before the system establishment. Mandal et al presented a new three-factor signcryption-based user access control scheme in [39]. Hu et al [40] constructed a new secure fuzzy ABSC scheme.…”
Section: A Attribute Based Signcryptionmentioning
confidence: 99%