2015
DOI: 10.1007/978-3-319-22915-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Our proposed scheme is split into five phases: (1) setup; (2) user registration; (3) authentication, authorization, and key agreement (AAK); (4) password and biometrics update; and (5) access privilege update. ECC is asymmetric key cryptography and provides similar security measures with smaller key sizes in comparison with other non-ECC-based asymmetric key cryptography methods such as RSA [27]. As WSNs are resource-constrained, techniques that are more lightweight, such as symmetric ones (XOR and hash computations, for example), are more appropriate [4].…”
Section: Our Proposed Schemementioning
confidence: 99%
“…Our proposed scheme is split into five phases: (1) setup; (2) user registration; (3) authentication, authorization, and key agreement (AAK); (4) password and biometrics update; and (5) access privilege update. ECC is asymmetric key cryptography and provides similar security measures with smaller key sizes in comparison with other non-ECC-based asymmetric key cryptography methods such as RSA [27]. As WSNs are resource-constrained, techniques that are more lightweight, such as symmetric ones (XOR and hash computations, for example), are more appropriate [4].…”
Section: Our Proposed Schemementioning
confidence: 99%
“…The second method takes advantage of asymmetric cryptographic algorithm, which has the challenge of reducing computation load as much as possible. However, the latest protocols with this method neglect the possibility of improvement [6][7][8]. …”
Section: IImentioning
confidence: 99%
“…The first one is the weakness or none of user anonymity [3,[5][6][7][8][9][10][11][12][13][14], which would cause being tracked easily. The second one is information leakage of the lost smart card [3,[6][7][8][9][10][11][12][13][14], which causes the attacker can do guesswork in a smaller space after extracting the information in the smart card. The third one is security recovery when system secret information is revealed [3, 5 -12], in which case, the system cannot update secret information conveniently because all users must register again.…”
Section: Advances In Computer Science Research Volume 44mentioning
confidence: 99%
See 1 more Smart Citation
“…It makes security to be an essential factor for WSNs, where data integrity is the most important requirement. Authentication has three major classes based on the primary cryptographic methods such as asymmetric cryptography, symmetric cryptography and hybrid methods [2]. Initially, it was estimated that WSNs would compose only of equal sensor nodes.…”
Section: Introductionmentioning
confidence: 99%