{"id":"https://openalex.org/W4410359091","doi":"https://doi.org/10.1109/icoin63865.2025.10993149","title":"A Security Analysis of \u201cA Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks\"","display_name":"A Security Analysis of \u201cA Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks\"","publication_year":2025,"publication_date":"2025-01-15","ids":{"openalex":"https://openalex.org/W4410359091","doi":"https://doi.org/10.1109/icoin63865.2025.10993149"},"language":"en","primary_location":{"id":"doi:10.1109/icoin63865.2025.10993149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin63865.2025.10993149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023803037","display_name":"Seunghwan Son","orcid":"https://orcid.org/0000-0002-3198-8467"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seunghwan Son","raw_affiliation_strings":["Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018787410","display_name":"Deokkyu Kwon","orcid":"https://orcid.org/0000-0003-0014-1965"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"DeokKyu Kwon","raw_affiliation_strings":["Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111389766","display_name":"Youngho Park","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngho Park","raw_affiliation_strings":["Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University,School of Electronic and Electrical Engineering,Daegu,South Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023803037"],"corresponding_institution_ids":["https://openalex.org/I31419693"],"apc_list":null,"apc_paid":null,"fwci":2.9212,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91225529,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"295"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.8065999746322632,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.8065999746322632,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.8030999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7183380126953125},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6533638834953308},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6502024531364441},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.600289523601532},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5975014567375183},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5395073294639587},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44108492136001587},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41662025451660156},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16230013966560364}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7183380126953125},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6533638834953308},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6502024531364441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.600289523601532},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5975014567375183},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5395073294639587},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44108492136001587},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41662025451660156},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16230013966560364}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icoin63865.2025.10993149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin63865.2025.10993149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311649","display_name":"Ministry of Education","ror":"https://ror.org/036nq5137"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W766082629","https://openalex.org/W2095054754","https://openalex.org/W2170239483","https://openalex.org/W2282018707","https://openalex.org/W2494606451","https://openalex.org/W2944931339","https://openalex.org/W4206784086","https://openalex.org/W4285205233","https://openalex.org/W4367665438","https://openalex.org/W4399616344","https://openalex.org/W4400877774","https://openalex.org/W4401022651"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1],"network":[2],"(WSN)":[3],"is":[4,136],"a":[5,65,78,150],"main":[6],"component":[7],"of":[8,11,143,145,153],"the":[9,104],"internet":[10],"things":[12],"(IoT)":[13],"technology,":[14],"it":[15,46],"can":[16,47],"be":[17,48],"predicted":[18],"to":[19,50,63,122,139,161],"apply":[20],"in":[21,36,69],"various":[22],"areas":[23],"including":[24],"smart":[25,27],"city,":[26],"home,":[28],"healthcare,":[29],"vehicular":[30],"network,":[31],"and":[32,40,45,95,115,126,158],"so":[33],"on.":[34],"However,":[35],"WSN":[37,70],"environments,":[38],"sensors":[39],"data":[41],"users":[42],"communicate":[43],"wirelessly":[44],"prone":[49,138],"malicious":[51],"attacks":[52],"such":[53],"as":[54],"forgery,":[55],"impersonation,":[56],"denial-of-service.":[57],"Therefore,":[58],"many":[59],"researchers":[60],"have":[61],"proposed":[62],"establish":[64],"session":[66],"key":[67],"securely":[68],"environments.":[71],"In":[72],"2024,":[73],"Thakur":[74,111,154],"et":[75,90,112,155],"al.":[76],"designed":[77],"three-factor":[79],"based":[80],"authentication":[81,125],"protocol":[82,92],"for":[83],"IoT-enabled":[84],"WSNs.":[85],"They":[86],"indicated":[87],"that":[88,102,118],"Sahoo":[89],"al.\u2019s":[91,113,156],"has":[93],"weaknesses,":[94],"therefore,":[96],"they":[97],"suggested":[98],"an":[99],"enhanced":[100],"scheme":[101,114,120,135,157],"resolved":[103],"previous":[105],"security":[106],"weaknesses.":[107],"Nevertheless,":[108],"we":[109,116],"reviewed":[110],"analyze":[117],"their":[119,134],"fails":[121],"support":[123],"mutual":[124,146],"does":[127],"not":[128],"provide":[129,149],"perfert":[130],"forward":[131],"secrecy.":[132],"Furthermore,":[133],"also":[137],"DoS":[140],"attack":[141],"because":[142],"lack":[144],"authentication.":[147],"We":[148],"detailed":[151],"analysis":[152],"propose":[159],"countermeasures":[160],"address":[162],"them.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
