An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments

In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them be...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 20; no. 4; p. 1215
Main Authors: Banerjee, Soumya, Odelu, Vanga, Das, Ashok Kumar, Chattopadhyay, Samiran, Park, Youngho
Format: Journal Article
Language:English
Published: Switzerland MDPI 22.02.2020
MDPI AG
Subjects:
ISSN:1424-8220, 1424-8220
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.
AbstractList In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.
In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.
Author Odelu, Vanga
Chattopadhyay, Samiran
Banerjee, Soumya
Park, Youngho
Das, Ashok Kumar
AuthorAffiliation 3 Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India; iitkgp.akdas@gmail.com or
4 Northumbria University, Newcastle upon Tyne NE1 8ST, UK
1 Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India; soumyaBanerjee@outlook.in (S.B.); samirancju@gmail.com (S.C.)
5 School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea
2 Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani Hyderabad Campus, Hyderabad 500 078, India; odelu.vanga@hyderabad.bits-pilani.ac.in
AuthorAffiliation_xml – name: 1 Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India; soumyaBanerjee@outlook.in (S.B.); samirancju@gmail.com (S.C.)
– name: 3 Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India; iitkgp.akdas@gmail.com or
– name: 5 School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea
– name: 2 Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani Hyderabad Campus, Hyderabad 500 078, India; odelu.vanga@hyderabad.bits-pilani.ac.in
– name: 4 Northumbria University, Newcastle upon Tyne NE1 8ST, UK
Author_xml – sequence: 1
  givenname: Soumya
  orcidid: 0000-0001-6455-5134
  surname: Banerjee
  fullname: Banerjee, Soumya
– sequence: 2
  givenname: Vanga
  orcidid: 0000-0001-6903-0361
  surname: Odelu
  fullname: Odelu, Vanga
– sequence: 3
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
– sequence: 4
  givenname: Samiran
  orcidid: 0000-0002-8929-9605
  surname: Chattopadhyay
  fullname: Chattopadhyay, Samiran
– sequence: 5
  givenname: Youngho
  orcidid: 0000-0002-0406-6547
  surname: Park
  fullname: Park, Youngho
BackLink https://www.ncbi.nlm.nih.gov/pubmed/32098448$$D View this record in MEDLINE/PubMed
BookMark eNplkdtqFTEUhoNU7EEvfAHJpYLb5jST5EbYlK0tFARbr0MmWelOmUlqMlPo2xu729LqVQ7rX9-_DodoL-UECL2n5AvnmhxXRoigjHav0AEVTKwUY2Tv2X0fHdZ6TQjjnKs3aJ8zopUQ6gBdrhPehBBdhDR_xutGvpvyUrFNHv_Mw1JnvF7mbYtGZ-eYE75wW5gAh1zwxWTLjE9ze27SbSw5TU1Y36LXwY4V3j2cR-jXt83lyenq_Mf3s5P1-coJQecVSGoV6ZSzPHipQWrf015Lr0Ap4jyVHWjWsYEJGhwAD4Ix1jlNZaDcUn6EznZcn-21uSmxlXNnso3m_iOXK9Pqi24E4ySDnlnmh94L17tB9JZ6r6SlHfFaNNbXHetmGSbwrvVR7PgC-jKS4tZc5VsjiSRaqgb4-AAo-fcCdTZTrA7G0SZoAzWM9x1VfeugST8893oyeVxLExzvBK7kWgsE4-J8P_1mHUdDifm7ePO0-Jbx6Z-MR-j_2j-hn6zy
CitedBy_id crossref_primary_10_1109_JSYST_2021_3127438
crossref_primary_10_32604_cmc_2024_054676
crossref_primary_10_3390_su13169241
crossref_primary_10_1109_ACCESS_2022_3224806
crossref_primary_10_1155_2022_8865158
crossref_primary_10_3390_s22176713
crossref_primary_10_1007_s11042_022_14140_z
crossref_primary_10_1109_ACCESS_2023_3293401
crossref_primary_10_1155_2022_7836461
crossref_primary_10_1371_journal_pone_0258279
crossref_primary_10_3390_s21041488
crossref_primary_10_1109_ACCESS_2024_3437294
crossref_primary_10_3390_app122412688
crossref_primary_10_1007_s12083_024_01882_w
crossref_primary_10_1016_j_comcom_2022_05_007
crossref_primary_10_1109_TII_2020_2990741
crossref_primary_10_3390_s23042309
crossref_primary_10_3390_su15075934
crossref_primary_10_3390_s23167268
crossref_primary_10_1002_ett_4479
crossref_primary_10_3390_s25175594
crossref_primary_10_1007_s43538_022_00110_4
crossref_primary_10_1109_JSYST_2022_3168234
crossref_primary_10_3390_app13116564
crossref_primary_10_1016_j_iot_2023_100913
crossref_primary_10_32604_cmc_2022_025660
crossref_primary_10_1016_j_cose_2022_103053
crossref_primary_10_1016_j_jksuci_2021_07_023
crossref_primary_10_3390_math11132951
crossref_primary_10_3390_sym13081369
crossref_primary_10_1007_s11227_022_04464_w
crossref_primary_10_3390_math11092123
crossref_primary_10_1109_ACCESS_2023_3336763
crossref_primary_10_1088_2631_8695_ade75d
crossref_primary_10_32604_cmc_2023_036189
crossref_primary_10_3390_s22186902
crossref_primary_10_1109_TNSE_2022_3151843
crossref_primary_10_3390_s22239174
crossref_primary_10_1109_ACCESS_2022_3191419
crossref_primary_10_3390_cryptography8020020
Cites_doi 10.1016/j.comnet.2010.05.010
10.1109/TIT.1983.1056650
10.1109/IE.2012.57
10.1109/WCNC.2019.8885493
10.1109/TIFS.2017.2721359
10.1007/s00779-012-0541-2
10.1109/TIFS.2015.2439964
10.1177/1550147719879379
10.1109/ACCESS.2019.2926578
10.1007/978-3-642-21931-3_48
10.1109/TWC.2015.2473165
10.1109/CICSYN.2013.42
10.1007/978-3-540-24676-3_31
10.1109/ISCE.2015.7177843
10.1109/TIFS.2018.2850299
10.1109/HICSS.2008.208
10.1109/JSEN.2015.2475298
10.1109/TC.2002.1004593
10.1016/j.future.2013.01.010
10.1016/j.engappai.2013.08.004
10.1109/ICCE.2011.5722864
10.1016/j.iot.2020.100158
10.1109/LSENS.2019.2905020
10.1007/3-540-48405-1_25
10.1109/JIOT.2019.2923373
10.1109/MCOM.2010.5473869
10.1109/INNOVATIONS.2012.6207712
10.1016/j.comcom.2010.03.013
10.1109/TII.2019.2895030
10.1016/j.cose.2019.06.002
ContentType Journal Article
Copyright 2020 by the authors. 2020
Copyright_xml – notice: 2020 by the authors. 2020
DBID AAYXX
CITATION
NPM
7X8
5PM
DOA
DOI 10.3390/s20041215
DatabaseName CrossRef
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList PubMed


CrossRef
MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: 7X8
  name: MEDLINE - Academic
  url: https://search.proquest.com/medline
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94
PMC7070978
32098448
10_3390_s20041215
Genre Journal Article
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ALIPV
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
7X8
5PM
ID FETCH-LOGICAL-c441t-e71a8058ca3fd79e79d61697d8e880cd175e9252b241fcee3f42225c917f13a13
IEDL.DBID DOA
ISICitedReferencesCount 49
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522448600266&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Fri Oct 03 12:51:02 EDT 2025
Tue Nov 04 01:56:22 EST 2025
Sun Nov 09 10:38:43 EST 2025
Wed Feb 19 02:30:41 EST 2025
Sat Nov 29 07:19:12 EST 2025
Tue Nov 18 22:02:32 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Internet of Things (IoT)
security
smart homes
anonymous authentication
session key agreement
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c441t-e71a8058ca3fd79e79d61697d8e880cd175e9252b241fcee3f42225c917f13a13
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0001-6455-5134
0000-0002-8929-9605
0000-0002-0406-6547
0000-0002-5196-9589
0000-0001-6903-0361
OpenAccessLink https://doaj.org/article/c72e62a2db6d4c6cb46a1dd87a150d94
PMID 32098448
PQID 2365186222
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94
pubmedcentral_primary_oai_pubmedcentral_nih_gov_7070978
proquest_miscellaneous_2365186222
pubmed_primary_32098448
crossref_citationtrail_10_3390_s20041215
crossref_primary_10_3390_s20041215
PublicationCentury 2000
PublicationDate 20200222
PublicationDateYYYYMMDD 2020-02-22
PublicationDate_xml – month: 2
  year: 2020
  text: 20200222
  day: 22
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2020
Publisher MDPI
MDPI AG
Publisher_xml – name: MDPI
– name: MDPI AG
References Gope (ref_31) 2019; 15
Banerjee (ref_32) 2019; 7
ref_14
ref_35
ref_12
ref_34
ref_10
Gomez (ref_2) 2010; 48
Banerjee (ref_11) 2019; 6
Wang (ref_30) 2017; 12
Gubbi (ref_6) 2013; 29
ref_19
ref_17
Shuai (ref_7) 2019; 86
ref_16
ref_15
Atzori (ref_1) 2010; 54
Dolev (ref_8) 1983; 29
Suryadevara (ref_5) 2013; 26
Kumar (ref_4) 2015; 16
Dey (ref_24) 2019; 3
Messerges (ref_9) 2002; 51
Wu (ref_36) 2019; 14
ref_25
Vaidya (ref_13) 2011; 34
ref_22
Odelu (ref_33) 2015; 10
ref_20
Yu (ref_21) 2019; 15
Han (ref_18) 2013; 17
ref_3
Fakroon (ref_23) 2020; 9
ref_28
ref_27
ref_26
Chang (ref_29) 2016; 15
References_xml – volume: 54
  start-page: 2787
  year: 2010
  ident: ref_1
  article-title: The Internet of Things: A Survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– volume: 29
  start-page: 198
  year: 1983
  ident: ref_8
  article-title: On the security of public key protocols
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1983.1056650
– ident: ref_28
– ident: ref_3
  doi: 10.1109/IE.2012.57
– ident: ref_22
  doi: 10.1109/WCNC.2019.8885493
– volume: 12
  start-page: 2776
  year: 2017
  ident: ref_30
  article-title: Zipf’s Law in Passwords
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2721359
– ident: ref_34
– volume: 17
  start-page: 945
  year: 2013
  ident: ref_18
  article-title: A novel secure key paring protocol for RF4CE ubiquitous smart home systems
  publication-title: Pers. Ubiquitous Comput.
  doi: 10.1007/s00779-012-0541-2
– volume: 10
  start-page: 1953
  year: 2015
  ident: ref_33
  article-title: A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2439964
– volume: 15
  start-page: 1
  year: 2019
  ident: ref_21
  article-title: Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1177/1550147719879379
– volume: 7
  start-page: 85627
  year: 2019
  ident: ref_32
  article-title: Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2926578
– ident: ref_14
  doi: 10.1007/978-3-642-21931-3_48
– volume: 15
  start-page: 357
  year: 2016
  ident: ref_29
  article-title: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2015.2473165
– ident: ref_35
– ident: ref_17
  doi: 10.1109/CICSYN.2013.42
– ident: ref_26
  doi: 10.1007/978-3-540-24676-3_31
– ident: ref_19
  doi: 10.1109/ISCE.2015.7177843
– volume: 14
  start-page: 319
  year: 2019
  ident: ref_36
  article-title: Secure Key Agreement and Key Protection for Mobile Device User Authentication
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2850299
– ident: ref_12
  doi: 10.1109/HICSS.2008.208
– volume: 16
  start-page: 254
  year: 2015
  ident: ref_4
  article-title: Lightweight and secure session-key establishment scheme in smart home environments
  publication-title: IEEE Sen. J.
  doi: 10.1109/JSEN.2015.2475298
– volume: 51
  start-page: 541
  year: 2002
  ident: ref_9
  article-title: Examining smart-card security under the threat of power analysis attacks
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2002.1004593
– volume: 29
  start-page: 1645
  year: 2013
  ident: ref_6
  article-title: Internet of Things (IoT): A vision, architectural elements, and future directions
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2013.01.010
– ident: ref_27
– volume: 26
  start-page: 2641
  year: 2013
  ident: ref_5
  article-title: Forecasting the behavior of an elderly using wireless sensors data in a smart home
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2013.08.004
– ident: ref_10
– ident: ref_15
  doi: 10.1109/ICCE.2011.5722864
– volume: 9
  start-page: 1
  year: 2020
  ident: ref_23
  article-title: Secure remote anonymous user authentication scheme for smart home environment
  publication-title: Internet Things
  doi: 10.1016/j.iot.2020.100158
– volume: 3
  start-page: 1
  year: 2019
  ident: ref_24
  article-title: Session-key establishment and authentication in a smart home network using public key cryptography
  publication-title: IEEE Sen. Lett.
  doi: 10.1109/LSENS.2019.2905020
– ident: ref_25
  doi: 10.1007/3-540-48405-1_25
– volume: 6
  start-page: 8739
  year: 2019
  ident: ref_11
  article-title: A Provably-Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2923373
– volume: 48
  start-page: 92
  year: 2010
  ident: ref_2
  article-title: Wireless home automation networks: A survey of architectures and technologies
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2010.5473869
– ident: ref_16
  doi: 10.1109/INNOVATIONS.2012.6207712
– volume: 34
  start-page: 326
  year: 2011
  ident: ref_13
  article-title: Robust one-time password authentication scheme using smart card for home network environment
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2010.03.013
– ident: ref_20
– volume: 15
  start-page: 4957
  year: 2019
  ident: ref_31
  article-title: Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2019.2895030
– volume: 86
  start-page: 132
  year: 2019
  ident: ref_7
  article-title: Anonymous authentication scheme for smart home environment with provable security
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.06.002
SSID ssj0023338
Score 2.527733
Snippet In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 1215
SubjectTerms anonymous authentication
automated validation of internet security protocols and applications (avispa)
internet of things (iot)
security
session key agreement
smart homes
Title An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
URI https://www.ncbi.nlm.nih.gov/pubmed/32098448
https://www.proquest.com/docview/2365186222
https://pubmed.ncbi.nlm.nih.gov/PMC7070978
https://doaj.org/article/c72e62a2db6d4c6cb46a1dd87a150d94
Volume 20
WOSCitedRecordID wos000522448600266&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Publicly Available Content
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwEB1B4QCHqnyHlpVBHDgQdWNv7OTYolRw6GrVFmk5Rf6KWokG1N1y5Lfz7GSjLKrEhUsUxVbizIzj9xz7DdF7iZg1mRapbjKTziT6nJ7iLOdNgQJu3FTHZBNqPi-Wy3IxSvUV1oR18sCd4Q6t4l5yzZ2RbmalNTOpM-cKpQFlXBmVQIF6NmSqp1oCzKvTERIg9YcrHnWlQu7b0egTRfrvQpZ_L5AcjTgne7TbQ0V21DXxCd3z7VN6PBIQfEYXRy2roggEbvGRDVye6daxsx_mdrVmYRIsLAnq5ubYObx07RmwKju_xuuzkCidVaP9bs_p60l18elz2udJSC3AzDr1KtPFNC-sFo1TpVelk5kslSs8eqd1QAi-5Dk3GK0bDIqiCfM-uQVTazKhM_GCdtA-_4qYN40OjEvA0jNdgo8JACygcKM8bucS-rCxX217EfGQy-J7DTIRTF0Ppk7o3VD1Z6eccVel4-CEoUIQu44XEAJ1HwL1v0IgobcbF9boHOGPh249jF1zIfMMnI3zhF52Lh0eJfi0LEBOE1Jbzt5qy3ZJe3UZBbgVvpNg36__R-P36REPFD7skucHtLO-ufVv6KH9tb5a3UzovlqqeCwm9OC4mi_OJjHScTz9XeHa4svp4tsfQqsErg
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient%2C+Anonymous+and+Robust+Authentication+Scheme+for+Smart+Home+Environments&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Soumya+Banerjee&rft.au=Vanga+Odelu&rft.au=Ashok+Kumar+Das&rft.au=Samiran+Chattopadhyay&rft.date=2020-02-22&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=20&rft.issue=4&rft.spage=1215&rft_id=info:doi/10.3390%2Fs20041215&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon