2016
DOI: 10.1002/sec.1573
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure user authentication and key agreement scheme for wireless sensor networks

Abstract: In recent years, user authentication has emerged as an interesting field of research in wireless sensor networks. Most recently, in 2016, Chang and Le presented a scheme to authenticate the users in wireless sensor network using a password and smart card. They proposed two protocols scriptP1 and scriptP2. scriptP1 is based on exclusive or (XOR) and hash functions, while scriptP2 deploys elliptic curve cryptography in addition to the two functions used in scriptP1. Although their protocols are efficient, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 90 publications
(42 citation statements)
references
References 45 publications
0
42
0
Order By: Relevance
“…The protocol [81] uses the BAN-logic to prove that the protocol can resist numerous security attacks, which include the attacks, found in the Amin and Biswas's scheme [73]. There are seven authentication protocols [154,73,75,78,81,158,223] that use the Automated Validation of Internet Security Protocols and Application (AVISPA) security analyzer [220]. The AVISPA tool provides a modular and expressive formal language for specifying security protocols and properties.…”
Section: Formal Security Verification Techniquesmentioning
confidence: 99%
“…The protocol [81] uses the BAN-logic to prove that the protocol can resist numerous security attacks, which include the attacks, found in the Amin and Biswas's scheme [73]. There are seven authentication protocols [154,73,75,78,81,158,223] that use the Automated Validation of Internet Security Protocols and Application (AVISPA) security analyzer [220]. The AVISPA tool provides a modular and expressive formal language for specifying security protocols and properties.…”
Section: Formal Security Verification Techniquesmentioning
confidence: 99%
“…From the table, it can be inferred that privacy is a problem that has not drawn enough attention from the researchers. In some schemes, [5] √ × √ Jung et al [6] √ × × Fan et al [7] × × × Amin and Biswas [8] × × × Nam et al [9] × × √ Lu et al [10] √ √ × Zhao et al [11] √ × × Hou et al [12] × × × Farash et al [13] × × × Turkanović et al [14] × × × PriAuth √ √ √ all the users share the same key to encrypt their identities, this means the encrypted identity could be decrypted by a malicious or curious user using the same key [5,6,10,13]. Some of the schemes fail to enable the anonymity of the user or sensor, such as [37][38][39].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, only the gateway could learn the identities. As for the shared key between user and sensor, in some schemes, the gateway knows the shared key in schemes [6][7][8][11][12][13][14], while, in some others, the gateway does not know the key, they use Diffie-Hellman (DH) anonymous key agreement protocol to build the shared key [1,2,4,5,9,30]. As we have discussed, the gateway is not allowed to know the shared key in order to prevent a curious gateway from eavesdropping the sensor data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations