2020
DOI: 10.3390/s20154143
|View full text |Cite
|
Sign up to set email alerts
|

SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks

Abstract: Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely used in various fields such as banks, hospitals, institutes to national defense, research, and so on. However, useful services are susceptible to security threats because sensitive data in various fields are exchanged via a public channel. Thus, secure authentication protocols are indispensable to provide various services in WSN. In 2019, Mo and Chen prese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 52 publications
0
24
0
Order By: Relevance
“…• The smart devices can be tampered, and physically captured by M A in the registration phase. Thus, M A can extract the secret credentials stored in its memory [34]- [36]. • M A can attempt "offline identity" and "offline password" guessing attacks.…”
Section: A Threat Modelmentioning
confidence: 99%
“…• The smart devices can be tampered, and physically captured by M A in the registration phase. Thus, M A can extract the secret credentials stored in its memory [34]- [36]. • M A can attempt "offline identity" and "offline password" guessing attacks.…”
Section: A Threat Modelmentioning
confidence: 99%
“…Recently, Yu et al [53] proposed SLUA-WSN which is a lightweight three-factor authentication scheme with escalated user authentication system security against attacks and protects user anonymity by employing symmetric and hash function along with fuzzy extractor for the user biometric feature. Their scheme is the best communication and computation cost of all the previous schemes in the state-of-art in the matter of robustness against sensor node capture, A4, A8, and A1, also it ensures F5, and F6.…”
Section: Symmetric Cryptography In Mobile Platformmentioning
confidence: 99%
“…In [34] scheme, they did not specify a method to prevent brute force attacks in case of the lost smart card. Their paper did not mention the concept of encrypting and locking smartcard data information with user biometric or password.…”
Section: Stolen Smartcard Attackmentioning
confidence: 99%