2018
DOI: 10.1002/ett.3295
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps

Abstract: A characteristic of wireless sensor networks (WSNs) different from traditional networks is that WSNs are vulnerable to various types of attacks because of their distinctive features, involving distributed and nomadic attribute, wireless transmission medium, and lack of centralized infrastructure of security protection. Recently, Kumari et al presented a mutual authentication and key agreement scheme for WSNs using chaotic maps. Unfortunately, we find that the scheme of Kumari et al cannot resist sensor node ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 30 publications
(51 citation statements)
references
References 31 publications
(61 reference statements)
0
51
0
Order By: Relevance
“…In this section, a review of the scheme of Li et al is presented. All the notations used in this paper are given in Table .…”
Section: Review Of the Scheme Of LI Et Almentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, a review of the scheme of Li et al is presented. All the notations used in this paper are given in Table .…”
Section: Review Of the Scheme Of LI Et Almentioning
confidence: 99%
“…It issues public parameters { p , q , r } that are calculated as r = q t mod p , where p is a large prime number, q is a generator of Z p , and a random number t ∈ Z p −1 is a private key of GWN. This phase is same as predeployment phase of the scheme of Li et al…”
Section: Proposed Schemementioning
confidence: 99%
See 3 more Smart Citations