2018
DOI: 10.1177/1550147718756311
|View full text |Cite
|
Sign up to set email alerts
|

On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

Abstract: In a recent paper, Chang and Le proposed an efficient smart card–based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(33 citation statements)
references
References 23 publications
0
33
0
Order By: Relevance
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 87%
See 3 more Smart Citations
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 87%
“…However, these schemes are not lightweight due to their huge overheads. In 2018, many multifactor user authentication schemes were presented (Challa et al [26], He et al [27], Ryu et al [28], Wazid et al [29], Li et al [30]) for the IoT environment. Unfortunately, Wazid's scheme is suffering from security weakness [31]; while, Challa's, He's, Ryu's, and X. Li's scheme have high computation and communication overheads.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2018, several studies were published on remote user authentication for the IoT environment [36][37][38][39][40][41]. The author in [36] presented an authentication scheme for ad hoc WSN to improve the security weakness of the scheme in [42] using ECC cryptograph. In Cyber-Physical Systems (CPS) and IoT, Lu et al [37] presented a mutual authentication proposed scheme with user anonymity.…”
Section: Related Workmentioning
confidence: 99%