Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

[HTML][HTML] A lightweight three factor authentication framework for IoT based critical applications

M Saqib, B Jasra, AH Moon - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT is emerging as a massive web of heterogeneous networks estimated to interconnect
over 41 billion devices by 2025, generating around 79 zettabytes of data. The …

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEE …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …

A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes

S Shin, T Kwon - Sensors, 2019 - mdpi.com
A wireless sensor network (WSN) is used for a smart home system's backbone that monitors
home environment and controls smart home devices to manage lighting, heating, security …

Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs

D Wang, P Wang, C Wang - ACM Transactions on Cyber-Physical …, 2020 - dl.acm.org
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …

Revisit of password-authenticated key exchange protocol for healthcare support wireless communication

M Kim, J Moon, D Won, N Park - Electronics, 2020 - mdpi.com
Wireless communication is essential for the infrastructure of a healthcare system. This
bidirectional communication is used for data collection and to control message delivery …