2016
DOI: 10.1002/cpe.3930
|View full text |Cite
|
Sign up to set email alerts
|

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

Abstract: Summary A wireless sensor network (WSN) typically consists of a large number of resource‐constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and designing secure and efficient user authentication and key agreement schemes for WSNs is an active research area. For example, in 2016, Farash et al. proposed a user authentication and key agreement scheme for WSNs. However, we reveal previously unpublished vulnerabilities in their scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 36 publications
0
25
0
Order By: Relevance
“…Similar to both schemes [77] and [81], Kumari et al [79] pointed out that the scheme of Farash et al [78] is insecure against some attacks. Especially, the work presented in [79] is efficient not only in terms of end-to-end delay (EED) (in seconds) and throughput (in bps), but also in terms of computation cost in either login and authentication phases compared to both schemes Turkanovic et al [54] and Farash et al [78].…”
Section: Authentication Protocols For Iosmentioning
confidence: 96%
“…Similar to both schemes [77] and [81], Kumari et al [79] pointed out that the scheme of Farash et al [78] is insecure against some attacks. Especially, the work presented in [79] is efficient not only in terms of end-to-end delay (EED) (in seconds) and throughput (in bps), but also in terms of computation cost in either login and authentication phases compared to both schemes Turkanovic et al [54] and Farash et al [78].…”
Section: Authentication Protocols For Iosmentioning
confidence: 96%
“…In the same year, Kumari et al proposed a powerful scheme that is resistant against stolen smart card, stolen verifier, and insider attacks. Also, some lightweight schemes have been recently designed . Kumari et al presented 2 lightweight protocols for wireless sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…Also, some lightweight schemes have been recently designed. 16,17 Kumari et al presented 2 lightweight protocols for wireless sensor networks. Both of them keep user's privacy, anonymity, and resistance against privilege insider attack and stolen verifier attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering idea has its own cluster head election strategy [6] so that the cluster head manages the network, to make the topology easy to be managed, and the use of data fusion compresses the amount of data transmission, and saves the energy costs. Based on the classic wireless sensor network time synchronization algorithm, we summarize the synchronization error and energy consumption factors, and design an improved time synchronization algorithm, that is, clustering-based low energy consumption time synchronization (CLECTS).…”
Section: Algorithm Descriptionmentioning
confidence: 99%
“…Scripting is mainly used to configure the user settings network environment structure and communication link attributes; (3) To establish agency of Agent protocol, which are used to determine the communication model and to bind protocol for the equipment; (4) Trace can record the event on a certain type in the simulation process and store in the trace file. NS2 takes trace file to record and save the whole process of simulation, and analyzes the trace file after the end of the simulation, which is a key step in NS2 simulation [9]; (5) To determine the total time of simulation, and then also involve the writing of some preparation information so that we have completed the preparation of the OTcl script; (6) To write the completed OTcl script using the ns command to implement and get the trace file; (7) To analyze the obtained trace file, get the data we need and analyze it.…”
Section: Simulation Platformmentioning
confidence: 99%