2018
DOI: 10.3390/s18124481
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks

Abstract: Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 26 publications
(43 reference statements)
0
25
0
Order By: Relevance
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 86%
See 2 more Smart Citations
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 86%
“…However, these schemes are not lightweight due to their huge overheads. In 2018, many multifactor user authentication schemes were presented (Challa et al [26], He et al [27], Ryu et al [28], Wazid et al [29], Li et al [30]) for the IoT environment. Unfortunately, Wazid's scheme is suffering from security weakness [31]; while, Challa's, He's, Ryu's, and X. Li's scheme have high computation and communication overheads.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…are suitable for analyzing an authentication protocol. Recently, many researchers [60][61][62] have verified the authentication in the user authentication protocol using ProVerif. The formal security analysis shows the results of verifying and analyzing the security of D-FAP protocol using ProVerif.…”
Section: Formal Verification By Proverifmentioning
confidence: 99%
“…Many security protocols (e.g., [ 6 , 7 , 8 , 9 ]) have been developed to satisfy these security and performance requirements. Among those protocols, Sharma and Kalra’s scheme [ 6 ] is specifically designed to improve the protocol’s efficiency.…”
Section: Introductionmentioning
confidence: 99%