{"id":"https://openalex.org/W3155734778","doi":"https://doi.org/10.1155/2021/5537018","title":"A Provably Secure Three\u2010Factor Authentication Protocol for Wireless Sensor Networks","display_name":"A Provably Secure Three\u2010Factor Authentication Protocol for Wireless Sensor Networks","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3155734778","doi":"https://doi.org/10.1155/2021/5537018","mag":"3155734778"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5537018","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5537018","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/5537018.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/5537018.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077673436","display_name":"Tsu\u2010Yang Wu","orcid":"https://orcid.org/0000-0001-8970-2452"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tsu-Yang Wu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100698157","display_name":"Lei Yang","orcid":"https://orcid.org/0000-0002-9835-5111"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Yang","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040392634","display_name":"Zhiyuan Lee","orcid":"https://orcid.org/0000-0001-8743-5290"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan Lee","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105826134","display_name":"Shu\u2010Chuan Chu","orcid":"https://orcid.org/0000-0003-2117-0618"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shu-Chuan Chu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056889098","display_name":"Saru Kumari","orcid":"https://orcid.org/0000-0003-4929-5383"},"institutions":[{"id":"https://openalex.org/I303593345","display_name":"Chaudhary Charan Singh University","ror":"https://ror.org/01hzdv945","country_code":"IN","type":"education","lineage":["https://openalex.org/I303593345"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN","IN"],"is_corresponding":false,"raw_author_name":"Saru Kumari","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250004, India"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250004, India","institution_ids":["https://openalex.org/I303593345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090500943","display_name":"Sachin Kumar","orcid":"https://orcid.org/0000-0002-5324-2156"},"institutions":[{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sachin Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad 201009, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad 201009, India","institution_ids":["https://openalex.org/I166533956"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5105826134"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":4.801,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.95015942,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9029908180236816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6726803779602051},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6681604385375977},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5835422277450562},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5515612363815308},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5048502087593079},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.47951582074165344},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.42946791648864746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4207218587398529},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.4203479290008545},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.41011983156204224},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07505697011947632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9029908180236816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6726803779602051},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6681604385375977},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5835422277450562},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5515612363815308},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5048502087593079},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.47951582074165344},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.42946791648864746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4207218587398529},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.4203479290008545},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.41011983156204224},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07505697011947632},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5537018","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5537018","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/5537018.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:115e935a66c34eb485819ad1fed58337","is_oa":true,"landing_page_url":"https://doaj.org/article/115e935a66c34eb485819ad1fed58337","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5537018","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5537018","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/5537018.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3155734778.pdf","grobid_xml":"https://content.openalex.org/works/W3155734778.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1483299212","https://openalex.org/W1498573661","https://openalex.org/W1866312296","https://openalex.org/W1999541554","https://openalex.org/W2002930326","https://openalex.org/W2007287631","https://openalex.org/W2015207020","https://openalex.org/W2046880106","https://openalex.org/W2047413095","https://openalex.org/W2051043592","https://openalex.org/W2071116430","https://openalex.org/W2116392345","https://openalex.org/W2122782274","https://openalex.org/W2128139253","https://openalex.org/W2175661655","https://openalex.org/W2480447786","https://openalex.org/W2656881249","https://openalex.org/W2734150319","https://openalex.org/W2760142258","https://openalex.org/W2765617399","https://openalex.org/W2778812501","https://openalex.org/W2789431917","https://openalex.org/W2805742484","https://openalex.org/W2898274421","https://openalex.org/W2903951964","https://openalex.org/W2910382407","https://openalex.org/W2949558343","https://openalex.org/W2952763883","https://openalex.org/W2969139182","https://openalex.org/W2998622684","https://openalex.org/W3004162218","https://openalex.org/W3011459329","https://openalex.org/W3021638025","https://openalex.org/W3023444110","https://openalex.org/W3025515017","https://openalex.org/W3033410953","https://openalex.org/W3042636178","https://openalex.org/W3087984272","https://openalex.org/W3096129203","https://openalex.org/W3107448032","https://openalex.org/W3109577422","https://openalex.org/W3113095334","https://openalex.org/W3119367934","https://openalex.org/W3120023204","https://openalex.org/W3122685509","https://openalex.org/W3127920551","https://openalex.org/W3128077504","https://openalex.org/W3129088219","https://openalex.org/W4252595028"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W4392012696","https://openalex.org/W4395453412","https://openalex.org/W2393298610","https://openalex.org/W3022695109","https://openalex.org/W2941888532","https://openalex.org/W2390304521","https://openalex.org/W4253316174","https://openalex.org/W2147816236","https://openalex.org/W2054202867"],"abstract_inverted_index":{"The":[0,19,124],"wireless":[1,16,22],"sensor":[2,9,23],"network":[3,6],"is":[4,109],"a":[5,60],"composed":[7],"of":[8,15,21,32,46,126],"nodes":[10],"self\u2010organizing":[11],"through":[12],"the":[13,30,39,44,96,107,112],"application":[14,20],"communication":[17],"technology.":[18],"networks":[24],"(WSNs)":[25],"requires":[26],"high":[27],"security,":[28],"but":[29],"transmission":[31],"sensitive":[33],"data":[34],"may":[35],"be":[36],"exposed":[37],"to":[38,42],"adversary.":[40],"Therefore,":[41],"guarantee":[43],"security":[45,52,108,127,136],"information":[47,83],"transmission,":[48],"researchers":[49],"propose":[50],"numerous":[51],"authentication":[53,63],"protocols.":[54],"Recently,":[55],"Wu":[56],"et":[57],"al.":[58],"proposed":[59,97],"new":[61],"three\u2010factor":[62],"protocol":[64,72,104,133],"for":[65],"WSNs.":[66],"However,":[67],"we":[68],"find":[69],"that":[70,131],"their":[71],"cannot":[73],"resist":[74],"key":[75],"compromise":[76],"impersonation":[77],"attacks":[78],"and":[79,92,115,121,128,137],"known":[80],"session\u2010specific":[81],"temporary":[82],"attacks.":[84],"Meanwhile,":[85],"it":[86],"also":[87],"violates":[88],"perfect":[89],"forward":[90],"secrecy":[91],"anonymity.":[93],"To":[94],"overcome":[95],"attacks,":[98],"this":[99],"paper":[100],"proposes":[101],"an":[102],"enhanced":[103],"in":[105],"which":[106],"verified":[110],"by":[111],"formal":[113],"analysis":[114],"informal":[116],"analysis,":[117],"Burross\u2010Abadii\u2010Needham":[118],"(BAN)":[119],"logic,":[120],"ProVerif":[122],"tools.":[123],"comparison":[125],"performance":[129],"proves":[130],"our":[132],"has":[134],"higher":[135],"lower":[138],"computational":[139],"overhead.":[140]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
