{"id":"https://openalex.org/W3122541846","doi":"https://doi.org/10.1109/jsyst.2021.3049163","title":"An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle","display_name":"An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle","publication_year":2021,"publication_date":"2021-01-26","ids":{"openalex":"https://openalex.org/W3122541846","doi":"https://doi.org/10.1109/jsyst.2021.3049163","mag":"3122541846"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2021.3049163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3049163","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042958918","display_name":"Chandrashekhar Meshram","orcid":"https://orcid.org/0000-0003-2434-8928"},"institutions":[{"id":"https://openalex.org/I4391012588","display_name":"Raja Shankar Shah University","ror":"https://ror.org/04hwwrz21","country_code":null,"type":"education","lineage":["https://openalex.org/I4391012588"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Chandrashekhar Meshram","raw_affiliation_strings":["Department of Postgraduate Studies and Research in Mathematics, Jaywanti Haksar Government Postgraduation College, College of Chhindwara University, Betul, India"],"affiliations":[{"raw_affiliation_string":"Department of Postgraduate Studies and Research in Mathematics, Jaywanti Haksar Government Postgraduation College, College of Chhindwara University, Betul, India","institution_ids":["https://openalex.org/I4391012588"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["AE","CN","JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["Founding Dean and Professor of College of Computing and Informatics, University of Sharjah, Sharjah, UAE","King Abdullah II School of Information Technology Department, The University of Jordan, Amman, Jordan","University of Science and Technology Bejing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Founding Dean and Professor of College of Computing and Informatics, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"King Abdullah II School of Information Technology Department, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"University of Science and Technology Bejing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047477860","display_name":"Cheng\u2010Chi Lee","orcid":"https://orcid.org/0000-0002-8918-1703"},"institutions":[{"id":"https://openalex.org/I114150738","display_name":"Fu Jen Catholic University","ror":"https://ror.org/04je98850","country_code":"TW","type":"education","lineage":["https://openalex.org/I114150738"]},{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Cheng-Chi Lee","raw_affiliation_strings":["Department of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei, R.O.C","Department of Photonics and Communication Engineering Asia University, Wufeng Shiang, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei, R.O.C","institution_ids":["https://openalex.org/I114150738"]},{"raw_affiliation_string":"Department of Photonics and Communication Engineering Asia University, Wufeng Shiang, Taiwan, R.O.C","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036538864","display_name":"Sarita Gajbhiye Meshram","orcid":"https://orcid.org/0000-0001-5453-3791"},"institutions":[{"id":"https://openalex.org/I141445968","display_name":"Ton Duc Thang University","ror":"https://ror.org/01drq0835","country_code":"VN","type":"education","lineage":["https://openalex.org/I141445968"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Sarita Gajbhiye Meshram","raw_affiliation_strings":["Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City, Vietnam","Faculty of Environment and Labour Safety, Ton Duc Thang University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I141445968"]},{"raw_affiliation_string":"Faculty of Environment and Labour Safety, Ton Duc Thang University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I141445968"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042958918"],"corresponding_institution_ids":["https://openalex.org/I4391012588"],"apc_list":null,"apc_paid":null,"fwci":2.2301,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.8784828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"15","issue":"4","first_page":"4927","last_page":"4938"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7380256652832031},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6316739320755005},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6152539849281311},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5696906447410583},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5434610247612},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.47939515113830566},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3323834538459778},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1532961130142212},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.09770813584327698}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380256652832031},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6316739320755005},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6152539849281311},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5696906447410583},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5434610247612},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.47939515113830566},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3323834538459778},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1532961130142212},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.09770813584327698}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2021.3049163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3049163","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W568925811","https://openalex.org/W590625283","https://openalex.org/W815054754","https://openalex.org/W1528064978","https://openalex.org/W1564860789","https://openalex.org/W1961854194","https://openalex.org/W1970949542","https://openalex.org/W2001159130","https://openalex.org/W2007287631","https://openalex.org/W2015207020","https://openalex.org/W2016120028","https://openalex.org/W2018145349","https://openalex.org/W2026130590","https://openalex.org/W2030248862","https://openalex.org/W2038897166","https://openalex.org/W2047413095","https://openalex.org/W2049495124","https://openalex.org/W2053134894","https://openalex.org/W2067438990","https://openalex.org/W2071116430","https://openalex.org/W2074516024","https://openalex.org/W2091857136","https://openalex.org/W2113355015","https://openalex.org/W2120218993","https://openalex.org/W2132544882","https://openalex.org/W2153281696","https://openalex.org/W2154282256","https://openalex.org/W2460674452","https://openalex.org/W2742281664","https://openalex.org/W2790635691","https://openalex.org/W2792168988","https://openalex.org/W2797008633","https://openalex.org/W2944931339","https://openalex.org/W3133596308","https://openalex.org/W4232836212","https://openalex.org/W6631553198","https://openalex.org/W6633927618","https://openalex.org/W6682852172"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W2656445685","https://openalex.org/W1004582678","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518","https://openalex.org/W2002093701","https://openalex.org/W4399463150"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,46,81],"networks":[2],"(WSNs)":[3],"are":[4,13],"the":[5,45,49,66,76,80,126,144,168,172,188,200,206,222],"backbones":[6],"of":[7,20,41,102,154,187,209],"numerous":[8],"real-time":[9],"monitoring":[10],"systems":[11,38],"that":[12,171],"applied":[14],"to":[15,54,70,85,142,198],"serve":[16],"many":[17],"different":[18],"parts":[19],"our":[21,210],"everyday":[22],"lives":[23],"including":[24],"traffic":[25],"management,":[26],"telecare,":[27],"pollution":[28],"control,":[29],"military":[30],"application,":[31],"among":[32],"others.":[33],"In":[34,52,147,202],"most":[35],"cases,":[36],"WSN":[37,141],"involve":[39],"exchanges":[40],"sensitive/private":[42],"data":[43,56,59,87],"between":[44],"nodes":[47],"and":[48,64,79,114,162,219,226],"outside":[50],"world.":[51],"order":[53,84],"preserve":[55],"privacy,":[57],"illegal":[58],"access":[60,88],"must":[61],"be":[62,71],"denied,":[63],"so":[65],"remote":[67],"client":[68,189],"has":[69],"properly":[72],"authorized":[73],"by":[74,96],"both":[75,217],"base":[77],"station":[78],"node":[82],"in":[83,125,167],"ensure":[86],"legitimacy.":[89],"Many":[90],"authentication":[91,107,116],"procedures":[92],"have":[93,214],"been":[94,215],"projected":[95,134],"researchers":[97],"based":[98],"on":[99],"various":[100],"frameworks":[101],"parameters":[103],"such":[104],"as":[105],"(two-factor":[106],"(2-FA)":[108],"=":[109,118],"Smart":[110,121],"card":[111,122],"+":[112,120,123],"Password)":[113,124],"(three-factor":[115],"(3-FA)":[117],"Biometric":[119],"literature.":[127],"Das":[128,155],"<italic":[129,156],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[130,157],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[131,158],"al.</i>":[132,159],"(2015)":[133],"a":[135,177,193],"three-factor":[136],"technique":[137,161],"for":[138],"resource-constrained":[139],"distributed":[140],"address":[143],"existing":[145],"pitfalls.":[146],"this":[148],"article,":[149],"we":[150,204],"present":[151],"an":[152],"analysis":[153],"\u2019s":[160],"point":[163],"out":[164],"some":[165],"inconsistencies":[166],"technique;":[169],"demonstrating":[170],"system":[173],"is":[174],"vulnerable":[175],"against":[176],"known":[178],"session-specific":[179],"particular":[180],"information":[181],"attack,":[182],"which":[183,213],"thus":[184],"prompts":[185],"leakage":[186],"identity.":[190],"We":[191],"offer":[192],"robust":[194],"subtree-based":[195],"3-FA":[196],"procedure":[197],"fix":[199],"problem.":[201],"addition,":[203],"show":[205],"security":[207],"strengths":[208],"devised":[211],"approach":[212],"established":[216],"informally":[218],"formally":[220],"using":[221],"random":[223],"oracle":[224],"model":[225],"AVISPA":[227],"tool.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
