2022
DOI: 10.1016/j.sysarc.2022.102650
|View full text |Cite
|
Sign up to set email alerts
|

SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…Later, Zhang et al [28] presented a remote mutual authentication scheme based on chaotic maps for UANs. Based on the architecture of underwater wireless sensor networks, Kumar et al [29] designed an authentication technique that establishes a session key for safe communication. In 2024, Tomović et al [30] proposed a Blockchain-based Key Management Protocol for UANs, and Wang et al [31] proposed a deep learning and random forest algorithm-based dynamic trust model for UANs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Later, Zhang et al [28] presented a remote mutual authentication scheme based on chaotic maps for UANs. Based on the architecture of underwater wireless sensor networks, Kumar et al [29] designed an authentication technique that establishes a session key for safe communication. In 2024, Tomović et al [30] proposed a Blockchain-based Key Management Protocol for UANs, and Wang et al [31] proposed a deep learning and random forest algorithm-based dynamic trust model for UANs.…”
Section: Related Workmentioning
confidence: 99%
“…It is shown that Zhang et al's scheme [28] cannot provide secure mutual authentication and establish the session key, and it fails to resist offline password guessing attacks and user impersonation attacks. In Kumar et al's scheme [29], the session key between the user and the Onshore Base Station cannot achieve perfect forward secrecy and may suffer from ID guessing attacks. On the other hand, their scheme cannot resist sensor node capture attacks and does not establish the session key between the user and the sensor node.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…In the study by Kaidarova et al [20], the authors focused on privacy and security in underwater communication systems. Kumar [29] proposed work focusing purely on sensor node communication, and used NS3 to perform simulations. The results revealed that their proposed scheme was able to cope with the conditions of the environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Pressure sensors, moving sensors, moving relay sensors, moving sink nodes, and AUVs are used in communication scenarios [28]. The ranges of nodes are increased underwater, creating massive problems for marine vehicles that are not able to effectively communicate and transfer data [29,30]. Relay and cooperation schemes can improve network performance and deliver data by means of advanced and fair mechanisms [31][32][33][34].…”
Section: Introductionmentioning
confidence: 99%
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%