2017
DOI: 10.20944/preprints201705.0076.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Smart Card-Based Secure Authentication Protocol in Multi-Server IoT Environment

Abstract: Abstract:In recent years, the internet of things has been widely utilized in various fields, such as in smart factories or connected cars. As its domain of application has expanded, it has begun to be employed using multi-server architectures for a more efficient use of resources. However, because users wishing to receive IoT services connect to multi-servers over wireless networks, this can expose systems to various attacks and result in serious security risks. To protect systems (and users) from potential se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221]. Recently, the target of authentication has gained attention for mobile smart objects, such as drones and vehicles [219,221,222].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221]. Recently, the target of authentication has gained attention for mobile smart objects, such as drones and vehicles [219,221,222].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…In AVISPA, there is a role for each entity, and these roles are independent of each other. AVISPA has an implementation in the form of four back ends, namely, TA4SP (Tree Automata based on Automatic Approximations for the Analysis of Security Protocols), OFMC (On-the-fly Model-Checker), CL-AtSe (Constraint Logic-based Attack Searcher), and SATMAC (SAT-based Model checker) [62]. We have evaluated the proposed protocol against man-in-the-middle and replay attacks under the OFMC and CL-AtSe back ends using SPAN.…”
Section: Formal Security Analysis Using the Avispa Toolmentioning
confidence: 99%
“…In [17] approach secure agnist hidden exposure and desynchronization attack. In [19] protected from identity plagiarism and exposure of key. In [21] using strong way with hidden session key to block unauthorized access to the network.…”
Section: Existing Authentication Mechanismsmentioning
confidence: 99%