2015
DOI: 10.3390/s150714960
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

Abstract: A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…In 2008, Zhang [12] resolved this security weakness by enhancing the Chebyshev polynomials, and showed that enhanced Chebyshev chaotic maps have similar properties to non-enhanced ones and have the discrete logarithm, and Diffie-Hellman problems. Thus, to enhance the efficiency, many extended chaotic map-based approaches [13][14][15][16][17][18][19][20][21] have been developed for communicating protocols and use in user authentication schemes, telecare medicine information systems and other cryptosystems. This investigation presents a novel IBE scheme, which is develops by using extended Chebyshev chaotic map assumptions.…”
Section: Introductionmentioning
confidence: 99%
“…In 2008, Zhang [12] resolved this security weakness by enhancing the Chebyshev polynomials, and showed that enhanced Chebyshev chaotic maps have similar properties to non-enhanced ones and have the discrete logarithm, and Diffie-Hellman problems. Thus, to enhance the efficiency, many extended chaotic map-based approaches [13][14][15][16][17][18][19][20][21] have been developed for communicating protocols and use in user authentication schemes, telecare medicine information systems and other cryptosystems. This investigation presents a novel IBE scheme, which is develops by using extended Chebyshev chaotic map assumptions.…”
Section: Introductionmentioning
confidence: 99%
“…To manage authorization and access to the server, we employ chaotic map and biometric verification, along with password verification. When chaos properties such as unpredictability are applied, there is an understanding of parameter sensitivity, e.g., of initial conditions, such that these properties satisfy the goal of efficiency, specifically, of being more computationally efficient than modular exponential computation and multiplication operations of an elliptic curve [21,22] and the essential properties of cryptography. Researchers have proposed security enhanced protocols [21,[23][24][25][26][27][28][29] that use biological characteristics such as fingerprints or irises.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, more and more researchers proposed an authentication and key-agreement scheme for WSNs environment [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 ]. Most of them proposed schemes for general purposes [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 17 , 24 ] and few of them proposed schemes for specific purposes [ 16 , 18 , 19 , 20 , 25 , 26 ]. For example, in 2009, Pecori and Veltri [ 25 ] proposed a new alternative key agreement protocol for setting up multimedia sessions between user agents (UAs) without requiring any pre-shared key or trust relationship or PKI, and it has been implemented and integrated in a publicly available VoIP UA.…”
Section: Introductionmentioning
confidence: 99%
“…Followed these studies, there were Li et al [ 12 ] and He et al [ 15 ] whose showed weaknesses of Xue et al’s scheme [ 10 ] and both of them then proposed an improved scheme. In 2015, Lee [ 14 ] showed weaknesses of Li et al’s scheme [ 12 ] and then proposed an improved scheme using extended chaotic maps. In the same year, Mesit and Brusta [ 24 ] proposed a secured node-to-node key agreement protocol, whose shared key is based on a symmetric encryption algorithm to solve the resource-constrained problem.…”
Section: Introductionmentioning
confidence: 99%