2018
DOI: 10.1007/s11276-018-1841-x
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight three factor scheme for real-time data access in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 35 publications
0
20
0
Order By: Relevance
“…A three-factor-based authentication scheme for real-time data access in wireless sensor networks (WSNs) is proposed in [12] to provide higher security and operational efficiency when compared with the two-factor-based authentication scheme. The proposed scheme uses smart card, biometric information and user's password and username factors to provide an authenticated real-time access to data in WSNs.…”
Section: Reciprocal Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…A three-factor-based authentication scheme for real-time data access in wireless sensor networks (WSNs) is proposed in [12] to provide higher security and operational efficiency when compared with the two-factor-based authentication scheme. The proposed scheme uses smart card, biometric information and user's password and username factors to provide an authenticated real-time access to data in WSNs.…”
Section: Reciprocal Authenticationmentioning
confidence: 99%
“…These schemes are resistant to most but not to all of the attacks. The schemes proposed in [9,[11][12]14] are not resistant to asynchronous attacks. Schemes in [10,[31][32] are vulnerable to playback attacks [20,29].…”
Section: Reciprocal Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we discovered that their scheme fails to provide three-factor security if the lost/stolen smart card is obtained by the attacker and the biometric information is also collected by the attacker without the awareness of the owner, so their scheme is not as secure as they claimed. With a similar reason, schemes of [46][47][48] fail to provide true three-factor security. Although Li et al employed fuzzy verifier technique and claimed that their protocol [49] for wireless medical sensor networks satisfies many security features, we found that it cannot resist replay attack.…”
Section: Related Workmentioning
confidence: 99%
“…To illustrate the effectiveness of our proposed scheme, we have presented the comparison of security features provided by our protocol and two related works by evaluating whether the 12 features in Table 7. Considering the earlier criteria-related study [25,26,27], based on a set of 11 features from [2] and a set of 10 features which is defined in [3], we put a list of 12 following independent criteria to show that our scheme provides higher security level than the previous works. Particularly, [2,3] did not mention the resistance of man-in-the-middle attack or not following the trace of the object as it moves from a zone to another.…”
Section: Security Features Comparisonmentioning
confidence: 99%