An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them be...
Saved in:
| Published in: | Sensors (Basel, Switzerland) Vol. 20; no. 4; p. 1215 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Switzerland
MDPI
22.02.2020
MDPI AG |
| Subjects: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes. |
|---|---|
| AbstractList | In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes. In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes.In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart devices over an insecure communication medium, the sensitive information exchanged among them becomes vulnerable to an adversary. Thus, there is a great thrust in developing an anonymous authentication scheme to provide secure communication for smart home environments. Most recently, an anonymous authentication scheme for smart home environments with provable security has been proposed in the literature. In this paper, we analyze the recent scheme to highlight its several vulnerabilities. We then address the security drawbacks and present a more secure and robust authentication scheme that overcomes the drawbacks found in the analyzed scheme, while incorporating its advantages too. Finally, through a detailed comparative study, we demonstrate that the proposed scheme provides significantly better security and more functionality features with comparable communication and computational overheads with similar schemes. |
| Author | Odelu, Vanga Chattopadhyay, Samiran Banerjee, Soumya Park, Youngho Das, Ashok Kumar |
| AuthorAffiliation | 3 Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India; iitkgp.akdas@gmail.com or 4 Northumbria University, Newcastle upon Tyne NE1 8ST, UK 1 Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India; soumyaBanerjee@outlook.in (S.B.); samirancju@gmail.com (S.C.) 5 School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea 2 Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani Hyderabad Campus, Hyderabad 500 078, India; odelu.vanga@hyderabad.bits-pilani.ac.in |
| AuthorAffiliation_xml | – name: 1 Department of Information Technology, Jadavpur University, Salt Lake City, Kolkata 700 098, India; soumyaBanerjee@outlook.in (S.B.); samirancju@gmail.com (S.C.) – name: 3 Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India; iitkgp.akdas@gmail.com or – name: 5 School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea – name: 2 Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani Hyderabad Campus, Hyderabad 500 078, India; odelu.vanga@hyderabad.bits-pilani.ac.in – name: 4 Northumbria University, Newcastle upon Tyne NE1 8ST, UK |
| Author_xml | – sequence: 1 givenname: Soumya orcidid: 0000-0001-6455-5134 surname: Banerjee fullname: Banerjee, Soumya – sequence: 2 givenname: Vanga orcidid: 0000-0001-6903-0361 surname: Odelu fullname: Odelu, Vanga – sequence: 3 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar – sequence: 4 givenname: Samiran orcidid: 0000-0002-8929-9605 surname: Chattopadhyay fullname: Chattopadhyay, Samiran – sequence: 5 givenname: Youngho orcidid: 0000-0002-0406-6547 surname: Park fullname: Park, Youngho |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/32098448$$D View this record in MEDLINE/PubMed |
| BookMark | eNplkdtqFTEUhoNU7EEvfAHJpYLb5jST5EbYlK0tFARbr0MmWelOmUlqMlPo2xu729LqVQ7rX9-_DodoL-UECL2n5AvnmhxXRoigjHav0AEVTKwUY2Tv2X0fHdZ6TQjjnKs3aJ8zopUQ6gBdrhPehBBdhDR_xutGvpvyUrFNHv_Mw1JnvF7mbYtGZ-eYE75wW5gAh1zwxWTLjE9ze27SbSw5TU1Y36LXwY4V3j2cR-jXt83lyenq_Mf3s5P1-coJQecVSGoV6ZSzPHipQWrf015Lr0Ap4jyVHWjWsYEJGhwAD4Ix1jlNZaDcUn6EznZcn-21uSmxlXNnso3m_iOXK9Pqi24E4ySDnlnmh94L17tB9JZ6r6SlHfFaNNbXHetmGSbwrvVR7PgC-jKS4tZc5VsjiSRaqgb4-AAo-fcCdTZTrA7G0SZoAzWM9x1VfeugST8893oyeVxLExzvBK7kWgsE4-J8P_1mHUdDifm7ePO0-Jbx6Z-MR-j_2j-hn6zy |
| CitedBy_id | crossref_primary_10_1109_JSYST_2021_3127438 crossref_primary_10_32604_cmc_2024_054676 crossref_primary_10_3390_su13169241 crossref_primary_10_1109_ACCESS_2022_3224806 crossref_primary_10_1155_2022_8865158 crossref_primary_10_3390_s22176713 crossref_primary_10_1007_s11042_022_14140_z crossref_primary_10_1109_ACCESS_2023_3293401 crossref_primary_10_1155_2022_7836461 crossref_primary_10_1371_journal_pone_0258279 crossref_primary_10_3390_s21041488 crossref_primary_10_1109_ACCESS_2024_3437294 crossref_primary_10_3390_app122412688 crossref_primary_10_1007_s12083_024_01882_w crossref_primary_10_1016_j_comcom_2022_05_007 crossref_primary_10_1109_TII_2020_2990741 crossref_primary_10_3390_s23042309 crossref_primary_10_3390_su15075934 crossref_primary_10_3390_s23167268 crossref_primary_10_1002_ett_4479 crossref_primary_10_3390_s25175594 crossref_primary_10_1007_s43538_022_00110_4 crossref_primary_10_1109_JSYST_2022_3168234 crossref_primary_10_3390_app13116564 crossref_primary_10_1016_j_iot_2023_100913 crossref_primary_10_32604_cmc_2022_025660 crossref_primary_10_1016_j_cose_2022_103053 crossref_primary_10_1016_j_jksuci_2021_07_023 crossref_primary_10_3390_math11132951 crossref_primary_10_3390_sym13081369 crossref_primary_10_1007_s11227_022_04464_w crossref_primary_10_3390_math11092123 crossref_primary_10_1109_ACCESS_2023_3336763 crossref_primary_10_1088_2631_8695_ade75d crossref_primary_10_32604_cmc_2023_036189 crossref_primary_10_3390_s22186902 crossref_primary_10_1109_TNSE_2022_3151843 crossref_primary_10_3390_s22239174 crossref_primary_10_1109_ACCESS_2022_3191419 crossref_primary_10_3390_cryptography8020020 |
| Cites_doi | 10.1016/j.comnet.2010.05.010 10.1109/TIT.1983.1056650 10.1109/IE.2012.57 10.1109/WCNC.2019.8885493 10.1109/TIFS.2017.2721359 10.1007/s00779-012-0541-2 10.1109/TIFS.2015.2439964 10.1177/1550147719879379 10.1109/ACCESS.2019.2926578 10.1007/978-3-642-21931-3_48 10.1109/TWC.2015.2473165 10.1109/CICSYN.2013.42 10.1007/978-3-540-24676-3_31 10.1109/ISCE.2015.7177843 10.1109/TIFS.2018.2850299 10.1109/HICSS.2008.208 10.1109/JSEN.2015.2475298 10.1109/TC.2002.1004593 10.1016/j.future.2013.01.010 10.1016/j.engappai.2013.08.004 10.1109/ICCE.2011.5722864 10.1016/j.iot.2020.100158 10.1109/LSENS.2019.2905020 10.1007/3-540-48405-1_25 10.1109/JIOT.2019.2923373 10.1109/MCOM.2010.5473869 10.1109/INNOVATIONS.2012.6207712 10.1016/j.comcom.2010.03.013 10.1109/TII.2019.2895030 10.1016/j.cose.2019.06.002 |
| ContentType | Journal Article |
| Copyright | 2020 by the authors. 2020 |
| Copyright_xml | – notice: 2020 by the authors. 2020 |
| DBID | AAYXX CITATION NPM 7X8 5PM DOA |
| DOI | 10.3390/s20041215 |
| DatabaseName | CrossRef PubMed MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
| DatabaseTitleList | PubMed CrossRef MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94 PMC7070978 32098448 10_3390_s20041215 |
| Genre | Journal Article |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ALIPV ARAPS HCIFZ KB. M7S NPM PDBOC 7X8 5PM |
| ID | FETCH-LOGICAL-c441t-e71a8058ca3fd79e79d61697d8e880cd175e9252b241fcee3f42225c917f13a13 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 49 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522448600266&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Fri Oct 03 12:51:02 EDT 2025 Tue Nov 04 01:56:22 EST 2025 Sun Nov 09 10:38:43 EST 2025 Wed Feb 19 02:30:41 EST 2025 Sat Nov 29 07:19:12 EST 2025 Tue Nov 18 22:02:32 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Internet of Things (IoT) security smart homes anonymous authentication session key agreement Automated Validation of Internet Security Protocols and Applications (AVISPA) |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c441t-e71a8058ca3fd79e79d61697d8e880cd175e9252b241fcee3f42225c917f13a13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0001-6455-5134 0000-0002-8929-9605 0000-0002-0406-6547 0000-0002-5196-9589 0000-0001-6903-0361 |
| OpenAccessLink | https://doaj.org/article/c72e62a2db6d4c6cb46a1dd87a150d94 |
| PMID | 32098448 |
| PQID | 2365186222 |
| PQPubID | 23479 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94 pubmedcentral_primary_oai_pubmedcentral_nih_gov_7070978 proquest_miscellaneous_2365186222 pubmed_primary_32098448 crossref_citationtrail_10_3390_s20041215 crossref_primary_10_3390_s20041215 |
| PublicationCentury | 2000 |
| PublicationDate | 20200222 |
| PublicationDateYYYYMMDD | 2020-02-22 |
| PublicationDate_xml | – month: 2 year: 2020 text: 20200222 day: 22 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2020 |
| Publisher | MDPI MDPI AG |
| Publisher_xml | – name: MDPI – name: MDPI AG |
| References | Gope (ref_31) 2019; 15 Banerjee (ref_32) 2019; 7 ref_14 ref_35 ref_12 ref_34 ref_10 Gomez (ref_2) 2010; 48 Banerjee (ref_11) 2019; 6 Wang (ref_30) 2017; 12 Gubbi (ref_6) 2013; 29 ref_19 ref_17 Shuai (ref_7) 2019; 86 ref_16 ref_15 Atzori (ref_1) 2010; 54 Dolev (ref_8) 1983; 29 Suryadevara (ref_5) 2013; 26 Kumar (ref_4) 2015; 16 Dey (ref_24) 2019; 3 Messerges (ref_9) 2002; 51 Wu (ref_36) 2019; 14 ref_25 Vaidya (ref_13) 2011; 34 ref_22 Odelu (ref_33) 2015; 10 ref_20 Yu (ref_21) 2019; 15 Han (ref_18) 2013; 17 ref_3 Fakroon (ref_23) 2020; 9 ref_28 ref_27 ref_26 Chang (ref_29) 2016; 15 |
| References_xml | – volume: 54 start-page: 2787 year: 2010 ident: ref_1 article-title: The Internet of Things: A Survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – volume: 29 start-page: 198 year: 1983 ident: ref_8 article-title: On the security of public key protocols publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1983.1056650 – ident: ref_28 – ident: ref_3 doi: 10.1109/IE.2012.57 – ident: ref_22 doi: 10.1109/WCNC.2019.8885493 – volume: 12 start-page: 2776 year: 2017 ident: ref_30 article-title: Zipf’s Law in Passwords publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2721359 – ident: ref_34 – volume: 17 start-page: 945 year: 2013 ident: ref_18 article-title: A novel secure key paring protocol for RF4CE ubiquitous smart home systems publication-title: Pers. Ubiquitous Comput. doi: 10.1007/s00779-012-0541-2 – volume: 10 start-page: 1953 year: 2015 ident: ref_33 article-title: A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2439964 – volume: 15 start-page: 1 year: 2019 ident: ref_21 article-title: Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1177/1550147719879379 – volume: 7 start-page: 85627 year: 2019 ident: ref_32 article-title: Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2926578 – ident: ref_14 doi: 10.1007/978-3-642-21931-3_48 – volume: 15 start-page: 357 year: 2016 ident: ref_29 article-title: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2015.2473165 – ident: ref_35 – ident: ref_17 doi: 10.1109/CICSYN.2013.42 – ident: ref_26 doi: 10.1007/978-3-540-24676-3_31 – ident: ref_19 doi: 10.1109/ISCE.2015.7177843 – volume: 14 start-page: 319 year: 2019 ident: ref_36 article-title: Secure Key Agreement and Key Protection for Mobile Device User Authentication publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2850299 – ident: ref_12 doi: 10.1109/HICSS.2008.208 – volume: 16 start-page: 254 year: 2015 ident: ref_4 article-title: Lightweight and secure session-key establishment scheme in smart home environments publication-title: IEEE Sen. J. doi: 10.1109/JSEN.2015.2475298 – volume: 51 start-page: 541 year: 2002 ident: ref_9 article-title: Examining smart-card security under the threat of power analysis attacks publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2002.1004593 – volume: 29 start-page: 1645 year: 2013 ident: ref_6 article-title: Internet of Things (IoT): A vision, architectural elements, and future directions publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2013.01.010 – ident: ref_27 – volume: 26 start-page: 2641 year: 2013 ident: ref_5 article-title: Forecasting the behavior of an elderly using wireless sensors data in a smart home publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2013.08.004 – ident: ref_10 – ident: ref_15 doi: 10.1109/ICCE.2011.5722864 – volume: 9 start-page: 1 year: 2020 ident: ref_23 article-title: Secure remote anonymous user authentication scheme for smart home environment publication-title: Internet Things doi: 10.1016/j.iot.2020.100158 – volume: 3 start-page: 1 year: 2019 ident: ref_24 article-title: Session-key establishment and authentication in a smart home network using public key cryptography publication-title: IEEE Sen. Lett. doi: 10.1109/LSENS.2019.2905020 – ident: ref_25 doi: 10.1007/3-540-48405-1_25 – volume: 6 start-page: 8739 year: 2019 ident: ref_11 article-title: A Provably-Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2923373 – volume: 48 start-page: 92 year: 2010 ident: ref_2 article-title: Wireless home automation networks: A survey of architectures and technologies publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2010.5473869 – ident: ref_16 doi: 10.1109/INNOVATIONS.2012.6207712 – volume: 34 start-page: 326 year: 2011 ident: ref_13 article-title: Robust one-time password authentication scheme using smart card for home network environment publication-title: Comput. Commun. doi: 10.1016/j.comcom.2010.03.013 – ident: ref_20 – volume: 15 start-page: 4957 year: 2019 ident: ref_31 article-title: Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2019.2895030 – volume: 86 start-page: 132 year: 2019 ident: ref_7 article-title: Anonymous authentication scheme for smart home environment with provable security publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.06.002 |
| SSID | ssj0023338 |
| Score | 2.527733 |
| Snippet | In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart... |
| SourceID | doaj pubmedcentral proquest pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 1215 |
| SubjectTerms | anonymous authentication automated validation of internet security protocols and applications (avispa) internet of things (iot) security session key agreement smart homes |
| Title | An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/32098448 https://www.proquest.com/docview/2365186222 https://pubmed.ncbi.nlm.nih.gov/PMC7070978 https://doaj.org/article/c72e62a2db6d4c6cb46a1dd87a150d94 |
| Volume | 20 |
| WOSCitedRecordID | wos000522448600266&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwEB1B4QCHqnyHlpVBHDgQdWNv7OTYolRw6GrVFmk5Rf6KWokG1N1y5Lfz7GSjLKrEhUsUxVbizIzj9xz7DdF7iZg1mRapbjKTziT6nJ7iLOdNgQJu3FTHZBNqPi-Wy3IxSvUV1oR18sCd4Q6t4l5yzZ2RbmalNTOpM-cKpQFlXBmVQIF6NmSqp1oCzKvTERIg9YcrHnWlQu7b0egTRfrvQpZ_L5AcjTgne7TbQ0V21DXxCd3z7VN6PBIQfEYXRy2roggEbvGRDVye6daxsx_mdrVmYRIsLAnq5ubYObx07RmwKju_xuuzkCidVaP9bs_p60l18elz2udJSC3AzDr1KtPFNC-sFo1TpVelk5kslSs8eqd1QAi-5Dk3GK0bDIqiCfM-uQVTazKhM_GCdtA-_4qYN40OjEvA0jNdgo8JACygcKM8bucS-rCxX217EfGQy-J7DTIRTF0Ppk7o3VD1Z6eccVel4-CEoUIQu44XEAJ1HwL1v0IgobcbF9boHOGPh249jF1zIfMMnI3zhF52Lh0eJfi0LEBOE1Jbzt5qy3ZJe3UZBbgVvpNg36__R-P36REPFD7skucHtLO-ufVv6KH9tb5a3UzovlqqeCwm9OC4mi_OJjHScTz9XeHa4svp4tsfQqsErg |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient%2C+Anonymous+and+Robust+Authentication+Scheme+for+Smart+Home+Environments&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Soumya+Banerjee&rft.au=Vanga+Odelu&rft.au=Ashok+Kumar+Das&rft.au=Samiran+Chattopadhyay&rft.date=2020-02-22&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=20&rft.issue=4&rft.spage=1215&rft_id=info:doi/10.3390%2Fs20041215&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c72e62a2db6d4c6cb46a1dd87a150d94 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |