2018
DOI: 10.1007/s12652-018-0712-8
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 35 publications
0
25
0
Order By: Relevance
“…If E steals the user's device, then E can find user's identity and password as follows E guesses identity ID a and password PW a of U x . E calculates z a = h ( PW a ‖ ID a ‖ n ). E verifies if z a = z x .…”
Section: Cryptanalysis Of the Scheme Of LI Et Almentioning
confidence: 99%
See 2 more Smart Citations
“…If E steals the user's device, then E can find user's identity and password as follows E guesses identity ID a and password PW a of U x . E calculates z a = h ( PW a ‖ ID a ‖ n ). E verifies if z a = z x .…”
Section: Cryptanalysis Of the Scheme Of LI Et Almentioning
confidence: 99%
“…E can see and retrieve all the information stored in smart card. 30 4. E cannot extract sensitive information stored in SN because tamper-resistant device is installed at SN.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though the security analysis of cryptographic protocols is normally used for the verification of security attributes, it is insufficient and simulation tool must be employed to verify the security requirements. Several schemes have used AVISPA for analysing and verifying the security correctness of their proposed work. AVISPA is a push button tool which is widely used to measure whether the implemented security protocol is UNSAFE or SAFE.…”
Section: Analysis Of Security and Performance Of Cake Protocolmentioning
confidence: 99%
“…The CAKE protocol is simulated using widely accepted OFMC and CL‐AtSe backend as done in most schemes . Since, CAKE protocol uses XOR operation which is not currently supported by SATMC and TA4SP backend, therefore the simulation results are omitted for these two backends.…”
Section: Analysis Of Security and Performance Of Cake Protocolmentioning
confidence: 99%