2021
DOI: 10.1002/dac.4724
|View full text |Cite
|
Sign up to set email alerts
|

An efficient anonymous user authentication and key agreement protocol for wireless sensor networks

Abstract: Summary Due to fast development of wireless technology, wireless sensor networks (WSNs) are used in many applications such environmental monitoring, health monitoring, and area monitoring. To protect WSNs from various security threats, many user authentication protocols have been proposed. Recently, Gope and Hwang have discussed an authentication protocol for WSNs. Here, we show that their scheme is not resistant to stolen verifier, user impersonation, smart card loss, and insider attacks. Also, it does not ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…However, the attacker is unable to extract the password PW i of user U i from it. Second, if the attacker wishes to obtain the user's password PW i through offline password guessing, he or she needs to have the biometric trait α i and the private key r i , however, the attacker is not in possession of α i and r i , and therefore, the attacker is unable to carry out an offline password guessing attack 32 . Again, B 2 = h ( HPW i ‖ ID i ‖ α i ‖ r i ) mod n 0 , when n 0 is taken large enough, the number of password guesses grows exponentially and it is not feasible to obtain the password by offline guessing.…”
Section: Security Analysismentioning
confidence: 99%
“…However, the attacker is unable to extract the password PW i of user U i from it. Second, if the attacker wishes to obtain the user's password PW i through offline password guessing, he or she needs to have the biometric trait α i and the private key r i , however, the attacker is not in possession of α i and r i , and therefore, the attacker is unable to carry out an offline password guessing attack 32 . Again, B 2 = h ( HPW i ‖ ID i ‖ α i ‖ r i ) mod n 0 , when n 0 is taken large enough, the number of password guesses grows exponentially and it is not feasible to obtain the password by offline guessing.…”
Section: Security Analysismentioning
confidence: 99%
“…(2) A can get the information stored in the smart card using power analysis [23,24]. (3) A can obtain the information in the smart card and the information transmitted by the user on the secure channel during the registration process [25]. (4) A can simultaneously obtain the information in the smart card and perform offline password guessing as stated in [26,27].…”
Section: Reat Modelmentioning
confidence: 99%
“…Park et al 12 analyzed their scheme and discovered that the scheme fails to withstand against the offline password guessing attack and developed a secure authentication scheme which uses biometrics. Gope and Hwang 13 in 2016 designed a scheme for WSN, however Kumar et al 14 analyzed their scheme and discovered that it does not protect against insider attack, stolen verifier, user impersonation and smart card loss attack.…”
Section: Introductionmentioning
confidence: 99%