8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications

      1 , 2 , 1 , 3 , 1 , 4 , 4
      Journal of Sensors
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With the booming integration of IoT technology in our daily life applications such as smart industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the security and privacy challenges of these systems. Furthermore, time-critical IoT applications in healthcare require access from external parties (users) to their real-time private information via wireless communication devices. Therefore, challenges such as user authentication must be addressed in IoT wireless sensor networks (WSNs). In this paper, we propose a secure and lightweight three-factor (3FA) user authentication protocol based on feature extraction of user biometrics for future IoT WSN applications. The proposed protocol is based on the hash and XOR operations, including (i) a 3-factor authentication (i.e., smart device, biometrics, and user password); (ii) shared session key; (iii) mutual authentication; and (iv) key freshness. We demonstrate the proposed protocol’s security using the widely accepted Burrows–Abadi–Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool, and the informal security analysis that demonstrates its other features. In addition, our simulations prove that the proposed protocol is superior to the existing related authentication protocols, in terms of security and functionality features, along with communication and computation overheads. Moreover, the proposed protocol can be utilized efficiently in most of IoT’s WSN applications, such as wireless healthcare sensor networks.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Article: not found

          A Logic of Authentication

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              An overview of perceptual hashing

              Niu, X. Niu (2008)
                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                Journal of Sensors
                Journal of Sensors
                Hindawi Limited
                1687-7268
                1687-725X
                April 27 2021
                April 27 2021
                : 2021
                : 1-18
                Affiliations
                [1 ]School of Computer Science, Huazhong University of Science and Technology, Wuhan, 400037 Hubei, China
                [2 ]Department of Mathematics, College of Science, University of Basrah, 61004, Iraq
                [3 ]Medical Instrumentation Engineering Techniques Department, Al-Mustaqbal University College, 51001 Hillah, Babil, Iraq
                [4 ]Department of Computer Science, Education College of Pure Science, University of Basrah, 61004, Iraq
                Article
                10.1155/2021/8871204
                d01a5603-0b0e-426e-95b4-543902f093a4
                © 2021

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article