{"id":"https://openalex.org/W4225357283","doi":"https://doi.org/10.1109/jsyst.2022.3152561","title":"A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks","display_name":"A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks","publication_year":2022,"publication_date":"2022-03-10","ids":{"openalex":"https://openalex.org/W4225357283","doi":"https://doi.org/10.1109/jsyst.2022.3152561"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2022.3152561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3152561","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100659960","display_name":"Yi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Li","raw_affiliation_strings":["Department of Computer Science, College of Information and Computer, Taiyuan University of Technology, Taiyuan, China"],"raw_orcid":"https://orcid.org/0000-0002-5837-9506","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Information and Computer, Taiyuan University of Technology, Taiyuan, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101945075","display_name":"Yuling Tian","orcid":"https://orcid.org/0000-0003-4681-5785"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Tian","raw_affiliation_strings":["Department of Computer Science, College of Information and Computer, Taiyuan University of Technology, Taiyuan, China"],"raw_orcid":"https://orcid.org/0000-0003-4681-5785","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Information and Computer, Taiyuan University of Technology, Taiyuan, China","institution_ids":["https://openalex.org/I9086337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100659960"],"corresponding_institution_ids":["https://openalex.org/I9086337"],"apc_list":null,"apc_paid":null,"fwci":4.2769,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.94364253,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"16","issue":"4","first_page":"6197","last_page":"6208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7686470746994019},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6459048390388489},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6223864555358887},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5442301630973816},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5427454113960266},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.48969772458076477},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4798992872238159},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.46833229064941406},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.426670104265213},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4059842824935913},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2812895178794861},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2718769311904907}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7686470746994019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6459048390388489},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6223864555358887},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5442301630973816},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5427454113960266},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.48969772458076477},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4798992872238159},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.46833229064941406},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.426670104265213},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4059842824935913},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2812895178794861},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2718769311904907},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2022.3152561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3152561","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1789074841","display_name":null,"funder_award_id":"61472271","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W766082629","https://openalex.org/W1537808739","https://openalex.org/W1561441787","https://openalex.org/W1866312296","https://openalex.org/W1976624614","https://openalex.org/W2002429869","https://openalex.org/W2023665855","https://openalex.org/W2029693536","https://openalex.org/W2067948398","https://openalex.org/W2071116430","https://openalex.org/W2095054754","https://openalex.org/W2117064875","https://openalex.org/W2122790294","https://openalex.org/W2152688060","https://openalex.org/W2282018707","https://openalex.org/W2412908136","https://openalex.org/W2474348401","https://openalex.org/W2480447786","https://openalex.org/W2592416275","https://openalex.org/W2734150319","https://openalex.org/W2776809775","https://openalex.org/W2892543765","https://openalex.org/W2898274421","https://openalex.org/W2923796516","https://openalex.org/W2944931339","https://openalex.org/W2949558343","https://openalex.org/W2983008824","https://openalex.org/W3005206852","https://openalex.org/W3018737616","https://openalex.org/W3021638025","https://openalex.org/W3025045832","https://openalex.org/W3084879446","https://openalex.org/W3087984272","https://openalex.org/W3120109452","https://openalex.org/W3122541846","https://openalex.org/W3132356282","https://openalex.org/W3134720613","https://openalex.org/W6682554491","https://openalex.org/W6788373078"],"related_works":["https://openalex.org/W2509423372","https://openalex.org/W2171815479","https://openalex.org/W2999962580","https://openalex.org/W1491549471","https://openalex.org/W3080258714","https://openalex.org/W2373613800","https://openalex.org/W2088289695","https://openalex.org/W2599010628","https://openalex.org/W2181469750","https://openalex.org/W2004539568"],"abstract_inverted_index":{"In":[0,102],"recent":[1,209],"years,":[2],"wireless":[3],"sensor":[4],"networks":[5],"(WSNs)":[6],"have":[7],"been":[8],"extensively":[9],"used":[10],"in":[11,37,156,188,204],"many":[12],"fields,":[13],"which":[14,149],"provide":[15],"great":[16],"convenience":[17],"for":[18,31,75,152],"people\u2019s":[19,29],"daily":[20],"work":[21],"and":[22,40,43,53,64,121,172,176],"life.":[23],"With":[24],"the":[25,60,93,153,157,189],"popularity":[26],"of":[27,125,168],"WSNs,":[28],"demands":[30],"related":[32],"authentication":[33,139],"protocols":[34],"are":[35,46,66,81],"developing":[36],"a":[38,135],"comprehensive":[39,136],"perfect":[41,90],"direction,":[42],"relevant":[44],"designs":[45],"focusing":[47],"more":[48],"on":[49],"two":[50],"aspects:":[51],"security":[52,63,86,123,143,160,177,190],"performance.":[54],"However,":[55],"current":[56],"research":[57],"cannot":[58],"avoid":[59],"problem":[61],"that":[62,183,199],"efficiency":[65],"not":[67],"compatible.":[68],"Some":[69],"studies":[70],"use":[71],"time-consuming":[72],"cryptographic":[73,131],"structures":[74],"security,":[76],"while":[77],"most":[78],"lightweight":[79,112,137],"schemes":[80],"designed":[82],"without":[83],"considering":[84],"certain":[85],"properties,":[87],"such":[88],"as":[89],"forward":[91],"secrecy,":[92],"resistance":[94],"to":[95,118],"known":[96],"session-specific":[97],"temporary":[98],"information":[99],"attack,":[100],"etc.":[101],"our":[103,184],"view,":[104],"this":[105,200],"conflict":[106],"can":[107],"be":[108],"resolved":[109],"by":[110],"using":[111],"cryptography":[113],"primitives":[114],"with":[115,141,207],"special":[116],"attention":[117],"protocol":[119,140,185],"vulnerabilities":[120],"ever-evolving":[122],"requirements":[124],"people.":[126],"By":[127],"abandoning":[128],"all":[129],"unnecessary":[130],"structures,":[132],"we":[133],"propose":[134],"three-factor":[138],"various":[142],"requirements,":[144],"including":[145],"adaptive":[146],"privacy":[147],"preservation,":[148],"is":[150,181,186],"suitable":[151],"user-friendly":[154],"scenario":[155],"WSN.":[158],"Through":[159],"analysis,":[161],"real-or-random":[162],"(ROR)":[163],"model":[164],"proof,":[165],"Automated":[166],"Validation":[167],"Internet":[169],"Security":[170],"Protocols":[171],"Applications":[173],"experimental":[174],"verification,":[175],"aspect":[178],"comparison,":[179],"it":[180],"proved":[182],"superior":[187],"aspect.":[191],"The":[192],"performance":[193,205],"experiment":[194],"under":[195],"MIRACL":[196],"library":[197],"shows":[198],"study":[201],"has":[202],"advantages":[203],"compared":[206],"other":[208],"research.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
