2021
DOI: 10.1155/2021/5537018
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Abstract: The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(25 citation statements)
references
References 48 publications
(79 reference statements)
0
25
0
Order By: Relevance
“…Unfortunately, their scheme cannot prevent replay attack because it does not use timestamps in the transmitted messages. Independently, Wu et al [61] and Kumar [62] suggested their hash-based authenticated protocol for WSN to secure the communication between user and sensors. However, we analyze Wu et al [61]'s scheme and found that it is susceptible to failure of providing threefactor security, lack of anonymity and information leakage attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, their scheme cannot prevent replay attack because it does not use timestamps in the transmitted messages. Independently, Wu et al [61] and Kumar [62] suggested their hash-based authenticated protocol for WSN to secure the communication between user and sensors. However, we analyze Wu et al [61]'s scheme and found that it is susceptible to failure of providing threefactor security, lack of anonymity and information leakage attack.…”
Section: Related Workmentioning
confidence: 99%
“…Independently, Wu et al [61] and Kumar [62] suggested their hash-based authenticated protocol for WSN to secure the communication between user and sensors. However, we analyze Wu et al [61]'s scheme and found that it is susceptible to failure of providing threefactor security, lack of anonymity and information leakage attack. Although Kumar's protocol [62] can effectively resist offline password guessing attack owing to fuzzy verifier technique, it still cannot prevent information leakage attack because there is a dependency between the three random numbers used to calculate session key.…”
Section: Related Workmentioning
confidence: 99%
“…Under this section, we have performed the formal security analysis using BAN-Logic [29][30][31] in addition to the security discussion of the proposed scheme.…”
Section: Security Analysismentioning
confidence: 99%
“…Second, all members in a WSN should authenticate each other before sending data [21,22]. Many authentication protocols have been proposed to overcome these two security issues [23][24][25].…”
Section: Introductionmentioning
confidence: 99%