{"id":"https://openalex.org/W3184995353","doi":"https://doi.org/10.1109/access.2021.3094875","title":"Questioning the Security of Three Recent Authentication and Key Agreement Protocols","display_name":"Questioning the Security of Three Recent Authentication and Key Agreement Protocols","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3184995353","doi":"https://doi.org/10.1109/access.2021.3094875","mag":"3184995353"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3094875","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09475067.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09475067.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021772077","display_name":"Amir Masoud Rahmani","orcid":"https://orcid.org/0000-0001-8641-6119"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Amir Masoud Rahmani","raw_affiliation_strings":["Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan"],"affiliations":[{"raw_affiliation_string":"Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012491705","display_name":"Mokhtar Mohammadi","orcid":"https://orcid.org/0000-0002-1393-5062"},"institutions":[{"id":"https://openalex.org/I4210125537","display_name":"Lebanese French University","ror":"https://ror.org/030t96b35","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210125537"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mokhtar Mohammadi","raw_affiliation_strings":["College of Engineering and Computer Science, Lebanese French University, Erbil, Iraq"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computer Science, Lebanese French University, Erbil, Iraq","institution_ids":["https://openalex.org/I4210125537"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022342785","display_name":"Shima Rashidi","orcid":"https://orcid.org/0000-0002-6862-750X"},"institutions":[{"id":"https://openalex.org/I4210118815","display_name":"University of Human Development","ror":"https://ror.org/02jz38b76","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210118815"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Shima Rashidi","raw_affiliation_strings":["University of Human Development, Sulaymaniyah, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Human Development, Sulaymaniyah, Iraq","institution_ids":["https://openalex.org/I4210118815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031725568","display_name":"Jan L\u00e1nsk\u00fd","orcid":"https://orcid.org/0000-0003-2485-1494"},"institutions":[{"id":"https://openalex.org/I105410415","display_name":"University of Finance and Administration","ror":"https://ror.org/020ydms54","country_code":"CZ","type":"education","lineage":["https://openalex.org/I105410415"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Jan Lansky","raw_affiliation_strings":["Faculty of Economic Studies, University of Finance and Administration, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Economic Studies, University of Finance and Administration, Prague, Czech Republic","institution_ids":["https://openalex.org/I105410415"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058948363","display_name":"Stanislava Mildeov\u00e1","orcid":"https://orcid.org/0000-0003-1234-9130"},"institutions":[{"id":"https://openalex.org/I105410415","display_name":"University of Finance and Administration","ror":"https://ror.org/020ydms54","country_code":"CZ","type":"education","lineage":["https://openalex.org/I105410415"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Stanislava Mildeova","raw_affiliation_strings":["Faculty of Economic Studies, University of Finance and Administration, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Economic Studies, University of Finance and Administration, Prague, Czech Republic","institution_ids":["https://openalex.org/I105410415"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036703361","display_name":"Masoumeh Safkhani","orcid":"https://orcid.org/0000-0002-1897-0828"},"institutions":[{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"funder","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Masoumeh Safkhani","raw_affiliation_strings":["Shahid Rajaee Teacher Training University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Shahid Rajaee Teacher Training University, Tehran, Iran","institution_ids":["https://openalex.org/I83123760"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056889098","display_name":"Saru Kumari","orcid":"https://orcid.org/0000-0003-4929-5383"},"institutions":[{"id":"https://openalex.org/I303593345","display_name":"Chaudhary Charan Singh University","ror":"https://ror.org/01hzdv945","country_code":"IN","type":"education","lineage":["https://openalex.org/I303593345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saru Kumari","raw_affiliation_strings":["Chaudhary Charan Singh University, Meerut, India"],"affiliations":[{"raw_affiliation_string":"Chaudhary Charan Singh University, Meerut, India","institution_ids":["https://openalex.org/I303593345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002779288","display_name":"Mehdi Hosseinzadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"funder","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mehdi Hosseinzadeh","raw_affiliation_strings":["Pattern Recognition and Machine Learning Lab, Gachon University, Sujeonggu, Seongnam, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Pattern Recognition and Machine Learning Lab, Gachon University, Sujeonggu, Seongnam, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institution_assertions":[],"countries_distinct_count":6,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.528,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"citation_normalized_percentile":{"value":0.702663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":"9","issue":null,"first_page":"98204","last_page":"98217"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.798367},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.5201},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5006747},{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.49198553},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.4185001}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8588291},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.798367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.73648113},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.67604995},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.617836},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.53492284},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.52432144},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5201},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5006747},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.49198553},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48163524},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.4185001},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4004432},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3807466},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32616305},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.26726994},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22667715},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.17871678},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17585477},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3094875","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09475067.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/187c3f878ded4b519c23c8cd947b3e3f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3094875","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09475067.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":47,"referenced_works":["https://openalex.org/W1484207026","https://openalex.org/W1743771216","https://openalex.org/W1965515427","https://openalex.org/W2016684702","https://openalex.org/W2028915867","https://openalex.org/W2029693536","https://openalex.org/W2081711536","https://openalex.org/W2082342720","https://openalex.org/W2093422627","https://openalex.org/W2099841931","https://openalex.org/W2112849336","https://openalex.org/W2126571539","https://openalex.org/W2161544833","https://openalex.org/W2430093443","https://openalex.org/W2477883450","https://openalex.org/W2516774445","https://openalex.org/W2574005192","https://openalex.org/W2810054347","https://openalex.org/W2907112888","https://openalex.org/W2949183553","https://openalex.org/W2962487379","https://openalex.org/W2963684830","https://openalex.org/W3004167355","https://openalex.org/W3022119250","https://openalex.org/W3036495523","https://openalex.org/W3041096851","https://openalex.org/W3052985477","https://openalex.org/W3083462945","https://openalex.org/W3084254285","https://openalex.org/W3087454209","https://openalex.org/W3090696871","https://openalex.org/W3091516168","https://openalex.org/W3094556797","https://openalex.org/W3097963446","https://openalex.org/W3104953546","https://openalex.org/W3118256525","https://openalex.org/W3119365941","https://openalex.org/W3119367934","https://openalex.org/W3126938564","https://openalex.org/W3127981346","https://openalex.org/W3135081412","https://openalex.org/W3152283462","https://openalex.org/W3153082288","https://openalex.org/W3154125869","https://openalex.org/W3155486556","https://openalex.org/W3159209806","https://openalex.org/W3205372622"],"related_works":["https://openalex.org/W53870421","https://openalex.org/W3158682621","https://openalex.org/W2943967608","https://openalex.org/W2798218778","https://openalex.org/W2537190205","https://openalex.org/W2517732453","https://openalex.org/W2491731723","https://openalex.org/W2123297491","https://openalex.org/W2078882516","https://openalex.org/W2032031862"],"abstract_inverted_index":{"Providing":[0],"the":[1,8,28,43,46,56,80,144,149,156,166,175,182,203,207,213,216,226],"desired":[2],"security":[3,64,81,92,125,189,228],"for":[4,86],"constrained":[5,87],"devices":[6,23],"in":[7,25,42,55,75,130,209],"edge":[9],"of":[10,12,27,66,82,119,148,155,165,174,181,215],"Internet":[11],"Things":[13],"(IoT)":[14],"systems":[15],"is":[16,184],"a":[17,108,187],"challenging":[18],"task.":[19],"Given":[20],"that":[21,142,197,224],"those":[22,67,121],"are":[24],"shortage":[26],"area":[29],"and":[30,34,89,107,158],"energy,":[31],"many":[32,52],"lightweight":[33],"ultra-lightweight":[35],"protocols":[36,85,99,122],"have":[37,101],"been":[38,102],"proposed":[39,110],"so":[40],"far":[41],"literature.":[44],"On":[45],"other":[47,217],"hand,":[48],"while":[49],"we":[50,78,133,195,219],"see":[51],"new":[53],"proposals":[54],"literature":[57],"to":[58,168],"secure":[59],"communications":[60],"on":[61],"IoT":[62],"systems,":[63],"analysis":[65],"schemes":[68,96],"has":[69],"not":[70],"received":[71],"enough":[72],"attention.":[73],"Hence,":[74],"this":[76,131],"paper,":[77,132],"analyse":[79],"three":[83],"recently":[84,109],"environments":[88],"show":[90,196],"their":[91],"loopholes.":[93],"The":[94,117,163],"analysed":[95],"include":[97],"two":[98],"which":[100],"published":[103],"by":[104,191],"IEEE":[105],"Access":[106],"protocol":[111,150,157,183],"entitled":[112],"Extremely":[113],"Good":[114],"Privacy":[115],"(EGP).":[116],"designers":[118],"all":[120],"claimed":[123],"optimal":[124],"against":[126,140],"active":[127],"adversaries.":[128],"However,":[129],"propose":[134],"an":[135,198],"efficient":[136,222],"secret":[137,146,172],"disclosure":[138],"attack":[139],"EGP":[141],"recovers":[143],"whole":[145,170],"parameters":[147,173],"after":[151,177],"eavesdropping/blocking":[152,178],"several":[153],"sessions":[154,180],"doing":[159],"some":[160],"off-line":[161],"computations.":[162],"probability":[164],"adversary":[167,199],"recover":[169],"2l":[171],"tag":[176,205],"68":[179],"0.99,":[185],"targeting":[186],"128-bit":[188],"level":[190],"l=128.":[192],"In":[193,212],"addition,":[194],"can":[200],"efficiently":[201],"desynchronize":[202],"target":[204],"from":[206],"reader/server":[208],"polynomial":[210],"time.":[211],"case":[214],"protocols,":[218],"also":[220],"present":[221],"attacks":[223],"contradict":[225],"designers'":[227],"claims.":[229]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3184995353","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-04-24T18:09:27.920123","created_date":"2021-08-02"}