2020
DOI: 10.1007/s11227-020-03448-y
|View full text |Cite
|
Sign up to set email alerts
|

Security of lightweight mutual authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Unfortunately, the scheme presented in [68] has scalability problems [69]. In addition, it is vulnerable to de-synchronization attacks [70]. The joint verification scheme in [71] as well as the authentication protocol in [72] can addressthe challenges in [68] in addition to upholding information privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, the scheme presented in [68] has scalability problems [69]. In addition, it is vulnerable to de-synchronization attacks [70]. The joint verification scheme in [71] as well as the authentication protocol in [72] can addressthe challenges in [68] in addition to upholding information privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Also, their scheme is susceptible to scalability issues and cannot be suitable for IoT environment. However, Tu et al (2020) note that the scheme Alamr et al ( 2018) is susceptible to full disclosure and de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%