2018
DOI: 10.1109/access.2018.2880225
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 50 publications
0
25
0
Order By: Relevance
“…Very recently, González et al 47 developed a key management and authentication scheme for heterogeneous WSN which was provably secure, flexible and competent. Further, Moghadam et al 48 identified the security pitfalls like a violation of perfect forward secrecy and stolen verifier attack in Alotaibi et al 49 authentication scheme for WSN and accordingly proposed an ECDH-based authentication scheme for WSN communication which was proved secure using SCYTHER simulation tool.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Very recently, González et al 47 developed a key management and authentication scheme for heterogeneous WSN which was provably secure, flexible and competent. Further, Moghadam et al 48 identified the security pitfalls like a violation of perfect forward secrecy and stolen verifier attack in Alotaibi et al 49 authentication scheme for WSN and accordingly proposed an ECDH-based authentication scheme for WSN communication which was proved secure using SCYTHER simulation tool.…”
Section: Literature Reviewmentioning
confidence: 99%
“…46 Above mentioned ECDLP and ECDDHP both are a computationally infeasible problem that means these problems cannot be solved within polynomial time t where q is a 160-bit prime number. 49…”
Section: • Send ( ∏ T 1 and Msg)mentioning
confidence: 99%
“…The authors of [ 126 ] proposed a novel mutual authentication and key management for WSN systems based on biometric and symmetric crypto-system. They compared their scheme with the schemes provided in the literature regarding computation and communication cost and security threats using both BAN-logic and AVISPA [ 127 ] tools.…”
Section: Analysis Of Iot Authentication Schemesmentioning
confidence: 99%
“…The main disadvantage of this scheme is that it did not consider the challenge-response pair (CRP) server comments when an existing group is empty. New mutual authentication and key management for WSN systems based on a biometric and symmetric cryptographic system in presented in [ 84 ]. The authors used BAN logic for the exactness of the mutual authentication and AVISPA tools to validate computational and communication costs.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%