2022
DOI: 10.1007/s11042-022-12088-8
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Mishra et al 21 designed an authentication scheme for IoT based WSNs. However, Kaur et al 22 analyzed their scheme and discovered security problems like sensor node impersonation attack, sensor node anonymity problem and insecure session key agreement. So, to overcome their weaknesses, Kaur et al 22 designed a secure authentication scheme for IoT based WSNs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Mishra et al 21 designed an authentication scheme for IoT based WSNs. However, Kaur et al 22 analyzed their scheme and discovered security problems like sensor node impersonation attack, sensor node anonymity problem and insecure session key agreement. So, to overcome their weaknesses, Kaur et al 22 designed a secure authentication scheme for IoT based WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…However, Kaur et al 22 analyzed their scheme and discovered security problems like sensor node impersonation attack, sensor node anonymity problem and insecure session key agreement. So, to overcome their weaknesses, Kaur et al 22 designed a secure authentication scheme for IoT based WSNs. In 2021, Kumar 23 devised a secure authentication scheme for WSNs which uses only hash function.…”
Section: Introductionmentioning
confidence: 99%