{"id":"https://openalex.org/W4210596428","doi":"https://doi.org/10.1109/access.2022.3146393","title":"A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network","display_name":"A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210596428","doi":"https://doi.org/10.1109/access.2022.3146393"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3146393","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3146393","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09693530.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09693530.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037882417","display_name":"Jiaqing Mo","orcid":"https://orcid.org/0000-0002-2252-7562"},"institutions":[{"id":"https://openalex.org/I183816158","display_name":"Zhaoqing University","ror":"https://ror.org/025n5kj18","country_code":"CN","type":"education","lineage":["https://openalex.org/I183816158"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaqing Mo","raw_affiliation_strings":["School of Computer Science and Software, Zhaoqing University, Zhaoqing, China","ORCiD"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software, Zhaoqing University, Zhaoqing, China","institution_ids":["https://openalex.org/I183816158"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052623047","display_name":"Zhongwang Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I183816158","display_name":"Zhaoqing University","ror":"https://ror.org/025n5kj18","country_code":"CN","type":"education","lineage":["https://openalex.org/I183816158"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongwang Hu","raw_affiliation_strings":["School of Computer Science and Software, Zhaoqing University, Zhaoqing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software, Zhaoqing University, Zhaoqing, China","institution_ids":["https://openalex.org/I183816158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101816571","display_name":"Wei Shen","orcid":"https://orcid.org/0000-0002-2182-7731"},"institutions":[{"id":"https://openalex.org/I183816158","display_name":"Zhaoqing University","ror":"https://ror.org/025n5kj18","country_code":"CN","type":"education","lineage":["https://openalex.org/I183816158"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Shen","raw_affiliation_strings":["School of Computer Science and Software, Zhaoqing University, Zhaoqing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software, Zhaoqing University, Zhaoqing, China","institution_ids":["https://openalex.org/I183816158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037882417"],"corresponding_institution_ids":["https://openalex.org/I183816158"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":9.8675,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.98090579,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"12137","last_page":"12152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8338656425476074},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5946365594863892},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5887808203697205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5849786996841431},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5630879402160645},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5189275741577148},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5121517181396484},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4851885437965393},{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.4824719727039337},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4733072519302368},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.4618697464466095},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.42848795652389526},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31037747859954834},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2646615505218506},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17480242252349854}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8338656425476074},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5946365594863892},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5887808203697205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5849786996841431},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5630879402160645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5189275741577148},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5121517181396484},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4851885437965393},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.4824719727039337},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4733072519302368},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.4618697464466095},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.42848795652389526},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31037747859954834},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2646615505218506},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17480242252349854}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3146393","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3146393","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09693530.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bc752b97a80646e290e0fee41781ad3a","is_oa":true,"landing_page_url":"https://doaj.org/article/bc752b97a80646e290e0fee41781ad3a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 12137-12152 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3146393","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3146393","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09693530.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210596428.pdf","grobid_xml":"https://content.openalex.org/works/W4210596428.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W766082629","https://openalex.org/W1483299212","https://openalex.org/W1487941708","https://openalex.org/W1747872978","https://openalex.org/W1849280677","https://openalex.org/W1866312296","https://openalex.org/W1967308747","https://openalex.org/W1968514873","https://openalex.org/W1982179579","https://openalex.org/W1999541554","https://openalex.org/W2007287631","https://openalex.org/W2029693536","https://openalex.org/W2048755632","https://openalex.org/W2051043592","https://openalex.org/W2052267638","https://openalex.org/W2055473620","https://openalex.org/W2067948398","https://openalex.org/W2071116430","https://openalex.org/W2114189125","https://openalex.org/W2147883419","https://openalex.org/W2168452204","https://openalex.org/W2187093997","https://openalex.org/W2282018707","https://openalex.org/W2396834172","https://openalex.org/W2403828610","https://openalex.org/W2412908136","https://openalex.org/W2480447786","https://openalex.org/W2514873781","https://openalex.org/W2521899819","https://openalex.org/W2523399242","https://openalex.org/W2564131315","https://openalex.org/W2592416275","https://openalex.org/W2601170509","https://openalex.org/W2605204252","https://openalex.org/W2745191645","https://openalex.org/W2765559104","https://openalex.org/W2779269988","https://openalex.org/W2780340923","https://openalex.org/W2799341537","https://openalex.org/W2824530277","https://openalex.org/W2885732921","https://openalex.org/W2896220783","https://openalex.org/W2923796516","https://openalex.org/W2942604444","https://openalex.org/W2963268116","https://openalex.org/W2971337410","https://openalex.org/W2996311023","https://openalex.org/W3000455992","https://openalex.org/W3008439638","https://openalex.org/W3009564320","https://openalex.org/W3016442584","https://openalex.org/W3019972815","https://openalex.org/W3034764066","https://openalex.org/W3035667619","https://openalex.org/W3044506507","https://openalex.org/W3088228272","https://openalex.org/W3128198860","https://openalex.org/W3150830691","https://openalex.org/W3155734778","https://openalex.org/W3163524359","https://openalex.org/W3188566172","https://openalex.org/W3203792363","https://openalex.org/W4240560709","https://openalex.org/W4254246953","https://openalex.org/W6713331607"],"related_works":["https://openalex.org/W2363600212","https://openalex.org/W2367067697","https://openalex.org/W2377502939","https://openalex.org/W3193848718","https://openalex.org/W2355452447","https://openalex.org/W2972452708","https://openalex.org/W1493058717","https://openalex.org/W2406792259","https://openalex.org/W2217572265","https://openalex.org/W4232990054"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,83,129,225],"network":[2,226],"has":[3,26],"been":[4],"widely":[5],"used":[6,120],"and":[7,20,23,42,55,62,100,128,134,144,157,172,202,213],"plays":[8],"a":[9,115,208],"vital":[10],"role":[11],"in":[12,40,170,223],"the":[13,29,37,103,109,112,123,126,135,153,158,168,179,197],"Internet":[14],"of":[15,31,36,53,125,181,187,200],"Things,":[16],"smart":[17],"cities,":[18],"military,":[19],"other":[21],"fields,":[22],"its":[24],"security":[25,38,143,150,198,212],"also":[27,206],"attracted":[28],"attention":[30],"many":[32],"researchers.":[33],"In":[34,175],"view":[35],"defects":[39],"Shin":[41,171,201],"Kwon\u2019s":[43,173],"scheme":[44,75,184],"such":[45],"as":[46],"failure":[47],"to":[48,90,121,130,141],"provide":[49],"three-factor":[50,72],"security,":[51],"lack":[52],"anonymity":[54,124],"untraceability,":[56],"user":[57,73,98,127,221],"impersonation":[58],"attack,":[59,65,133],"desynchronization":[60,132],"attack":[61,96],"privileged":[63],"insider":[64],"we":[66,189],"suggest":[67],"an":[68],"improved":[69],"provably":[70],"secure":[71],"authentication":[74,113,222],"based":[76],"on":[77,97],"Chebyshev":[78,136],"chaotic":[79,137],"mapping":[80,138],"for":[81,220],"wireless":[82,224],"network,":[84],"which":[85],"employs":[86],"fuzzy":[87],"verifier":[88],"technique":[89],"prevent":[91,131],"attacker":[92],"from":[93],"offline":[94],"guessing":[95],"identity":[99,117],"password":[101],"when":[102],"stolen/lost":[104],"smartcard":[105],"is":[106,119,139,217],"acquired":[107],"by":[108,177],"attacker.":[110],"During":[111],"phase,":[114],"dynamic":[116],"mechanism":[118],"ensure":[122],"introduced":[140],"improve":[142],"reduce":[145],"computation":[146],"overhead.":[147],"The":[148],"rigorous":[149],"proof":[151],"under":[152],"random":[154],"oracle":[155],"model":[156],"formal":[159],"verification":[160],"via":[161],"ProVerif":[162],"show":[163],"that":[164,186,191],"our":[165,182,192],"protocol":[166],"overcomes":[167],"weaknesses":[169],"scheme.":[174],"addition,":[176],"comparing":[178],"performance":[180],"proposed":[183],"with":[185],"others,":[188],"demonstrate":[190],"proposal":[193],"not":[194],"only":[195],"solves":[196],"risks":[199],"Kwon.\u2019s":[203],"protocol,":[204],"but":[205],"achieves":[207],"better":[209],"tradeoff":[210],"between":[211],"efficiency,":[214],"therefore,":[215],"it":[216],"more":[218],"suitable":[219],"environments.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
