A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System

Shreeya Swagatika Sahoo, Sujata Mohanty, Kshira Sagar Sahoo, Mahmoud Daneshmand, Amir H. Gandomi

Research output: Contribution to journalArticlepeer-review

27 Scopus citations

Abstract

Internet of Things (IoT) is an expanding technology that facilitate physical devices to interconnect each other over a public channel. Moreover, the security of the next-generation wireless mobile communication technology, namely, 5G with IoT, has been a field of much interest among researchers in the last several years. Previously, Sharif et al. have suggested an IoT-based lightweight three-party authentication scheme proclaiming a secured scheme against different threats. However, it was found that the scheme could not achieve user anonymity and guarantee session key security. Additionally, the scheme fails to provide proper authentication in the login phase, and it s unable to update a new password in the password change phase. Thus, we propose an improved three-factor-based data transmission authentication scheme (TDTAS) to address the weaknesses. The formal security analysis has been proved using the Real-or-Random (RoR) model. The informal security analysis demonstrates that the scheme is secure against several known attacks and achieves more security features. In addition, the comparison of the work with other related schemes demonstrates the proposed scheme has less communicational and storage costs.

Original languageEnglish
Pages (from-to)15087-15099
Number of pages13
JournalIEEE Internet of Things Journal
Volume10
Issue number17
DOIs
StatePublished - 1 Sep 2023

Keywords

  • 5G
  • Internet of Things (IoT)
  • Real-or-Random (RoR)
  • authentication
  • biometric
  • elliptic curve cryptography (ECC)

Fingerprint

Dive into the research topics of 'A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System'. Together they form a unique fingerprint.

Cite this