Literature DB >> 32530957

Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments.

Chi-Tung Chen, Cheng-Chi Lee, Iuon-Chang Lin.   

Abstract

[This corrects the article DOI: 10.1371/journal.pone.0232277.].

Entities:  

Year:  2020        PMID: 32530957      PMCID: PMC7292375          DOI: 10.1371/journal.pone.0234631

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


There are errors in the author affiliations. The correct affiliations are as follows: Chi-Tung Chen1, Cheng-Chi Lee3,4, Iuon-Chang Lin2,4 1 Department of Distribution Management (Information Management), National Chin-Yi University of Technology, Taichung, Taiwan, R.O.C. 2 Department of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei City, Taiwan, R.O.C. 3 Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, R.O.C. 4 Department of Management Information Systems, National Chung Hsing University, Taichung, Taiwan, R.O.C. There is an error in Fig 4. Part of the figure is missing. Please see the complete, correct Fig 4 here.
Fig 4

Login phase; authentication and key agreement phase.

There are errors in the typesetting of the columns in Tables 3 and 4. Please see the correct Tables 3 and 4 here.
Table 3

Functionality comparison of our scheme with other related schemes.

OursOstad-Sharif(2019)[2]Amin et al.(2018)[26]Chang et al.(20160[27]Xue et al.(2103)[7]Yeh et al.(2011)[8]Khan et al.(2010)[24]Chen et al.(2010)[25]Das(2009)[5]
Password protectionYesYesYesNoNoYesYesNoNo
Stolen smart card attack resistanceYesYesYesNoNoNoNoNoNo
Masquerade attack resistanceYesYesYesNoYesYesYesNoNo
Replay attacks resistanceYesYesYesNoYesNoYesYesYes
Insider attack resistanceYesYesYesYesNoYesYesNoNo
Password updating/changingYesNoYesYesNoNoYesNoNo
Time synchronization avoidanceYesNoNoNoNoYesNoNoNo
Mutual authenticationYesNoYesYesYesYesYesYesNo
Session key agreementYesYesYesYesYesYesNoNoNo
User anonymityYesYesYesNoYesNoYesYesYes
GWN bypassing attack resistanceYesYesYesYesYesYesNoNoNo
Table 4

Performance comparison of our scheme with other related schemes.

OursOstad-Sharif(2019)[2]Amin et al.(2018)[26]Chang et al.(20160[27]Xue et al.(2103)[7]Yeh et al.(2011)[8]Khan et al.(2010)[24]Chen et al.(2010)[25]Das(2009)[5]
Computational cost
   Authentication phase
      User4Th10Th13Th3Th5Th2Tecc+1Th3Th4Th3Th
      GWN8Th14Th14Th5Th11Th4Tecc+3Th5Th5Th4Th
      Sensor Node3Th3Th2Th1Th3Th2Tecc+2Th2Th2Th1Th
   key agreement phase
      User3Th2Th1Th3Th3Th1Th- *- *- *
      GWN3Th3Th3Th3Th3Th1Th- *- *- *
      Sensor Node3Th2Th2Th4Th3Th1Th- *- *- *
   Total24Th34Th35Th19Th28Th8Tecc+9Th
Communication cost
   Transmitted message466443443

* Khan et al. scheme, Chen et al. scheme and Das scheme do not provide the key agreement phase for session key agreement.

* Khan et al. scheme, Chen et al. scheme and Das scheme do not provide the key agreement phase for session key agreement.
  1 in total

1.  Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments.

Authors:  Chi-Tung Chen; Cheng-Chi Lee; Iuon-Chang Lin
Journal:  PLoS One       Date:  2020-04-30       Impact factor: 3.240

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.