{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:24:10Z","timestamp":1772101450033,"version":"3.50.1"},"reference-count":65,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2020,9,22]]},"abstract":"<jats:p>The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT). IoT has become a novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number of services and applications emerging in the field of IoT that include healthcare, surveillance, industries, transportation, and security. A service provider (SP) offers several services that are accessible through smart applications from any time, anywhere, and any place via the Internet. Due to the open nature of mobile communication and the Internet, these services are extremely susceptible to various malicious attacks, e.g., unauthorized access from malicious intruders. Therefore, to overcome these susceptibilities, a robust authentication scheme is the finest solution. In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services. Our introduced scheme utilizes lightweight elliptic curve cryptography (ECC), hash operations, and XOR operations. The theoretical analysis and formal proof are presented to demonstrate that our scheme provides resistance against several security attacks. Performance evaluation and comparison of our scheme with several related schemes for IoT environment are carried out using the PyCrypto library in Ubuntu and mobile devices. The performance analysis shows that our scheme has trivial storage and communication cost. Hence, the devised scheme is more efficient not only in terms of storage, communication, and computation overheads but also in terms of providing sufficient security against various malicious attacks.<\/jats:p>","DOI":"10.1155\/2020\/8829319","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:16:44Z","timestamp":1600820204000},"page":"1-17","source":"Crossref","is-referenced-by-count":12,"title":["An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure"],"prefix":"10.1155","volume":"2020","author":[{"given":"Akasha","family":"Shafiq","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, Pakistan"}]},{"given":"Muhammad Faizan","family":"Ayub","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5046-7766","authenticated-orcid":true,"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, Pakistan"}]},{"given":"Mazhar","family":"Sadiq","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus 57000, Pakistan"}]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250004, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6502-472X","authenticated-orcid":true,"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04758-1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.026"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.877704"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2006.1687761"},{"key":"5","first-page":"202","volume-title":"Identity-based key agreement with unilateral identity privacy using pairings","year":"2006"},{"key":"6","year":"1996"},{"key":"9","first-page":"277","volume-title":"Authentication and payment in future mobile systems","year":"1998"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2004.70"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/25.994813"},{"key":"13","first-page":"152","volume":"2006","year":"2006","journal-title":"IACR Cryptology ePrint Archive"},{"key":"15","first-page":"306","volume-title":"Novel remote user authentication scheme using bilinear pairings","year":"2007"},{"key":"17","first-page":"47","volume-title":"Identity-based cryptosystems and signature schemes","year":"1984"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.58"},{"key":"20","first-page":"335","volume-title":"Efficient two-party password-based key exchange protocols in the uc framework","year":"2008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1712746"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2020.2966160"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3390\/s19214752"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.08.032"},{"issue":"4","key":"25","first-page":"1137","volume":"21","year":"2020","journal-title":"Journal of Internet of Technology"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1029-3"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.04.006"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4139"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/kem.439-440.1367"},{"issue":"101","key":"30","volume":"31","year":"2013","journal-title":"Journal of Shenyang Normal University"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"34","first-page":"29","volume":"12","year":"2017","journal-title":"IEEE COMSOC MMTC Commun.-Frontiers"},{"key":"35","year":"2017"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.008"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322973"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2016.2574719"},{"issue":"12","key":"41","first-page":"5529","volume":"10","year":"2016","journal-title":"TIIS"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1655"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.028"},{"issue":"6","key":"44","first-page":"1089","volume":"18","year":"2016","journal-title":"IJ Network Security"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2017.12.026"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06659-6"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.3390\/s19214625"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2288-3"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.019"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1759-3"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980213"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/748\/1\/012026"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2977670"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040634"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.025"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2934947"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01215-9"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102499"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.07.001"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703088"},{"key":"65","first-page":"139","volume-title":"Authenticated key exchange secure against dictionary attacks","year":"2000"},{"key":"66","first-page":"65","volume-title":"Password-based authenticated key exchange in the three-party setting","year":"2005"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718756311"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2902840"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946400"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.009"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1604-0"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2136506"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2020\/8829319.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2020\/8829319.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2020\/8829319.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:16:49Z","timestamp":1600820209000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2020\/8829319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":65,"alternative-id":["8829319","8829319"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8829319","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"value":"1687-725X","type":"print"},{"value":"1687-7268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,22]]}}}