A Three Factor based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
نویسندگان
چکیده
Internet of Things (IoT) is an expanding technology that facilitate physical devices to inter-connect each other over a public channel. Moreover, the security next-generation wireless mobile communication technology, namely 5G with IoT, has been field much interest among researchers in last several years. Previously, Sharif et al. had suggested IoTbased lightweight three-party authentication scheme proclaiming secured against different threats. However, it was found could not achieve user anonymity and guarantee session key security. Additionally, fails provide proper login phase, s unable update new password change phase. Thus, we propose improved three-factor-based data transmission (TDTAS) address weaknesses. The formal analysis proved using Real-or-Random (RoR) model. informal demonstrates secure known attacks achieves more features. In addition, comparison work related schemes proposed less communicational storage costs.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملRobust biometric-based user authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) are applied widely a variety of areas such as realtime traffic monitoring, measurement of seismic activity, wildlife monitoring and so on. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment in the field. In 2010, Yuan et al. proposed the first biometric-based user authentication scheme for WSNs. However, Yoon e...
متن کاملAn Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attr...
متن کاملA Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملA Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology chan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2023
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2023.3264565