2019
DOI: 10.1002/dac.4194
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure biometrics and ECC‐based authentication and key agreement scheme for WSNs

Abstract: SummaryWireless sensor networks (WSNs) underpin many applications of the Internet of Things (IoT), ranging from smart cities to unmanned surveillance and others. Efficient user authentication in WSNs, particularly in settings with diverse IoT device configurations and specifications (eg, resource‐constrained IoT devices) and difficult physical conditions (eg, physical disaster area and adversarial environment such as battlefields), remains challenging, both in research and in practice. Here, we put forth a use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…In 2020, Kumari and Renuka [27] proposed a user authentication and key agrrement scheme using elliptic curve cryptography(ECC). In the same year Wang et al [48] shows that for the schemes [4,31,32,40] if adversary gets users biometric and smart card then he can get password of the user.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2020, Kumari and Renuka [27] proposed a user authentication and key agrrement scheme using elliptic curve cryptography(ECC). In the same year Wang et al [48] shows that for the schemes [4,31,32,40] if adversary gets users biometric and smart card then he can get password of the user.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we compare the security features and computational cost of our proposed scheme with [4,19,21,27,32,39,40]. For comparison of computation cost, we use the results of [37].…”
Section: Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…ECC is used widely in constrained environments, particularly those relying on low computing power devices (e.g., IoT and WSNs) [21][22][23]. It provides the same level of cryptographic hardness as do other asymmetric cryptography protocols, but it is marked by small key sizes and higher performance [24,25].…”
Section: Preliminary: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…Kumari and Renuka proposed a biometircs-based AKA for WSN scenario. 7 But their scheme cannot provide anonymity, impersonality attack resilience, replay attack, and DoS attack. Hence security and privacy are unable to be guaranteed.…”
mentioning
confidence: 99%