2014
DOI: 10.3390/s140610081
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Abstract: Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Y… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
166
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 191 publications
(166 citation statements)
references
References 27 publications
0
166
0
Order By: Relevance
“…The second method takes advantage of asymmetric cryptographic algorithm, which has the challenge of reducing computation load as much as possible. However, the latest protocols with this method neglect the possibility of improvement [6][7][8]. …”
Section: IImentioning
confidence: 99%
See 2 more Smart Citations
“…The second method takes advantage of asymmetric cryptographic algorithm, which has the challenge of reducing computation load as much as possible. However, the latest protocols with this method neglect the possibility of improvement [6][7][8]. …”
Section: IImentioning
confidence: 99%
“…The first one is the weakness or none of user anonymity [3,[5][6][7][8][9][10][11][12][13][14], which would cause being tracked easily. The second one is information leakage of the lost smart card [3,[6][7][8][9][10][11][12][13][14], which causes the attacker can do guesswork in a smaller space after extracting the information in the smart card. The third one is security recovery when system secret information is revealed [3, 5 -12], in which case, the system cannot update secret information conveniently because all users must register again.…”
Section: Advances In Computer Science Research Volume 44mentioning
confidence: 99%
See 1 more Smart Citation
“…In scheme [1], when a user asks to access a sensor's data, he could send his request 1 = {ID , ID , , , , } to the sensor.…”
Section: User Impersonationmentioning
confidence: 99%
“…Thus, only the gateway could learn the identities. As for the shared key between user and sensor, in some schemes, the gateway knows the shared key in schemes [6][7][8][11][12][13][14], while, in some others, the gateway does not know the key, they use Diffie-Hellman (DH) anonymous key agreement protocol to build the shared key [1,2,4,5,9,30]. As we have discussed, the gateway is not allowed to know the shared key in order to prevent a curious gateway from eavesdropping the sensor data.…”
Section: Related Workmentioning
confidence: 99%