2024
DOI: 10.1038/s41598-024-52134-z
|View full text |Cite
|
Sign up to set email alerts
|

ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

Wenfeng Huang

Abstract: In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…It ensures the security and integrity of user data by utilizing a blockchain in a named data approach to safeguard communication between authentication servers and sensors. In another work, the system designed provides an ECC-based three-factor user authentication and key agreement system for WSNs in the Internet of Things applications that are context-aware and privacy-preserving [9]. Contextual data, including location and ambient conditions, are used by the technique to improve authentication while protecting user privacy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It ensures the security and integrity of user data by utilizing a blockchain in a named data approach to safeguard communication between authentication servers and sensors. In another work, the system designed provides an ECC-based three-factor user authentication and key agreement system for WSNs in the Internet of Things applications that are context-aware and privacy-preserving [9]. Contextual data, including location and ambient conditions, are used by the technique to improve authentication while protecting user privacy.…”
Section: Related Workmentioning
confidence: 99%
“…The more corresponding minutiae points are discovered and the closer they match, the greater the similarity score. Otherwise, they are deemed mismatched, and access is refused [9,19].…”
mentioning
confidence: 99%