2016
DOI: 10.1002/sec.1464
|View full text |Cite
|
Sign up to set email alerts
|

An efficient multi‐gateway‐based three‐factor user authentication and key agreement scheme in hierarchical wireless sensor networks

Abstract: User authentication in wireless sensor network (WSN) plays a very important role in which a legal registered user is allowed to access the real‐time sensing information from the sensor nodes inside WSN. To allow such access, a user needs to be authenticated by the accessed sensor nodes as well as gateway nodes inside WSNs. Because of resource limitations and vulnerability to physical capture of some sensor nodes by an attacker, design of a secure user authentication in WSN continues to be an important and chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 88 publications
(53 citation statements)
references
References 60 publications
0
53
0
Order By: Relevance
“…Thus, the proposed scheme allows that user to update his/her password and biometrics without the hassle of interaction with the server Sj. Consequently, the proposed scheme cannot also achieve truly three-factor security as pointed out in Das et al (2016), , and . pointed out that the widely used formal methods, such as random oracle model and the BAN logic, can not capture some structural mistakes.…”
Section: Password and Biometric Update Phasementioning
confidence: 84%
See 1 more Smart Citation
“…Thus, the proposed scheme allows that user to update his/her password and biometrics without the hassle of interaction with the server Sj. Consequently, the proposed scheme cannot also achieve truly three-factor security as pointed out in Das et al (2016), , and . pointed out that the widely used formal methods, such as random oracle model and the BAN logic, can not capture some structural mistakes.…”
Section: Password and Biometric Update Phasementioning
confidence: 84%
“…It does not need control server in mutual authentication. However, Wei et al (2014) As in Das et al (2016), we also point out the security failures of previous user authentication schemes. The security failures of previous user authentication schemes are addressed in Huang et al (2011), , and Wang et al (2012).…”
Section: Introductionmentioning
confidence: 92%
“…The AVISPA tool provides a modular and expressive formal language for specifying security protocols and properties. The protocol [223] uses…”
Section: Formal Security Verification Techniquesmentioning
confidence: 99%
“…Gope et al [280] proposed a special idea for resilience of DoS attacks in designing anonymous user authentication protocol. Combining three techniques, namely, smart card, password, and personal biometrics, Das et al [223] proposed a three-factor user authentication and key agreement scheme based on multi-gateway WSN architecture. The scheme [223] is efficient in terms of computational, communication, and energy costs compared to the schemes [73], [48], [44], [54].…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…In recent years, issue of key distribution and user authentication mechanisms received a substantial attention from researchers . Various schemes to authenticate users in WSNs have been designed as discussed in the review of , but most of these schemes are at risk of one or other security attacks.…”
Section: Introductionmentioning
confidence: 99%