TY - JOUR
T1 - A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
AU - Sahoo, Shreeya Swagatika
AU - Mohanty, Sujata
AU - Sahoo, Kshira Sagar
AU - Daneshmand, Mahmoud
AU - Gandomi, Amir H.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2023/9/1
Y1 - 2023/9/1
N2 - Internet of Things (IoT) is an expanding technology that facilitate physical devices to interconnect each other over a public channel. Moreover, the security of the next-generation wireless mobile communication technology, namely, 5G with IoT, has been a field of much interest among researchers in the last several years. Previously, Sharif et al. have suggested an IoT-based lightweight three-party authentication scheme proclaiming a secured scheme against different threats. However, it was found that the scheme could not achieve user anonymity and guarantee session key security. Additionally, the scheme fails to provide proper authentication in the login phase, and it s unable to update a new password in the password change phase. Thus, we propose an improved three-factor-based data transmission authentication scheme (TDTAS) to address the weaknesses. The formal security analysis has been proved using the Real-or-Random (RoR) model. The informal security analysis demonstrates that the scheme is secure against several known attacks and achieves more security features. In addition, the comparison of the work with other related schemes demonstrates the proposed scheme has less communicational and storage costs.
AB - Internet of Things (IoT) is an expanding technology that facilitate physical devices to interconnect each other over a public channel. Moreover, the security of the next-generation wireless mobile communication technology, namely, 5G with IoT, has been a field of much interest among researchers in the last several years. Previously, Sharif et al. have suggested an IoT-based lightweight three-party authentication scheme proclaiming a secured scheme against different threats. However, it was found that the scheme could not achieve user anonymity and guarantee session key security. Additionally, the scheme fails to provide proper authentication in the login phase, and it s unable to update a new password in the password change phase. Thus, we propose an improved three-factor-based data transmission authentication scheme (TDTAS) to address the weaknesses. The formal security analysis has been proved using the Real-or-Random (RoR) model. The informal security analysis demonstrates that the scheme is secure against several known attacks and achieves more security features. In addition, the comparison of the work with other related schemes demonstrates the proposed scheme has less communicational and storage costs.
KW - 5G
KW - Internet of Things (IoT)
KW - Real-or-Random (RoR)
KW - authentication
KW - biometric
KW - elliptic curve cryptography (ECC)
UR - http://www.scopus.com/inward/record.url?scp=85159657229&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85159657229&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2023.3264565
DO - 10.1109/JIOT.2023.3264565
M3 - Article
AN - SCOPUS:85159657229
VL - 10
SP - 15087
EP - 15099
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 17
ER -