2020
DOI: 10.1007/s11276-020-02451-8
|View full text |Cite
|
Sign up to set email alerts
|

User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…Proverif verifies that the authentication queries are true, while two attack queries are not true. Consequently, this indicates that the homeowner and the user can mutually authenticate each other, and the attacker cannot figure out the KEKs [25]. Thus, our scheme satisfies the necessary security and authenticity requirements.…”
Section: Formal Verificationmentioning
confidence: 95%
“…Proverif verifies that the authentication queries are true, while two attack queries are not true. Consequently, this indicates that the homeowner and the user can mutually authenticate each other, and the attacker cannot figure out the KEKs [25]. Thus, our scheme satisfies the necessary security and authenticity requirements.…”
Section: Formal Verificationmentioning
confidence: 95%