2020
DOI: 10.1007/s12046-019-1254-2
|View full text |Cite
|
Sign up to set email alerts
|

Construction of lightweight authentication scheme for network applicants using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(22 citation statements)
references
References 30 publications
0
22
0
Order By: Relevance
“…This mechanism neither authenticates sensor node nor provides security against attacks like masquerade, replay, Sybil, and others. In Dharminder et al, 32 a lightweight authentication scheme is proposed, which is based on lightweight cryptographic operations like XOR operation, hash function, and others. However, the proposed mechanism is proposed for user authentication and maintains user anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…This mechanism neither authenticates sensor node nor provides security against attacks like masquerade, replay, Sybil, and others. In Dharminder et al, 32 a lightweight authentication scheme is proposed, which is based on lightweight cryptographic operations like XOR operation, hash function, and others. However, the proposed mechanism is proposed for user authentication and maintains user anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…The 𝒜 computes X1=A2r2$$ {X}_1={A}_2\oplus {r}_2 $$ and calculate session key SK=hfalse(X1HUIDr2sr2T1T2false)$$ SK=h\left({X}_1\left\Vert H{U}_{\mathrm{ID}}\right\Vert {r}_2\left\Vert s{r}_2\right\Vert {T}_1\Big\Vert {T}_2\right) $$. Thus, Dharminder et al's protocol 37 cannot resist KSSTI attack.…”
Section: Security Analysis Of Dharminder Et Al's Protocolmentioning
confidence: 99%
“…• We analyse security of Bouchaala et al's 35 protocol to illustrate its vulnerability to replay and KSSTI attacks. Furthermore, security analysis of Kaur et al's 36 protocol reveals that it is prone to a replay attack and Dharminder et al's 37 protocol is vulnerable to KSSTI and user traceability attacks.…”
Section: Motivations and Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Limbasiya et al [36] developed a smart card authentication approach for network applicants and showed that it could withstand known attacks and was more time efficient. However, Dharminder et al [37] established that Limbasiya et al 's [36] scheme was not secure against password guessing attacks, stolen card attacks, and disclosure of a session key. Sureshkumar et al [38] presented an enhanced mutual authentication mechanism for session initiation and announced that it provided user anonymity.…”
Section: Literature Reviewmentioning
confidence: 99%