Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks

4Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 2013, Althobaiti et al. proposed an efficient biometricbased user authentication scheme for wireless sensor networks. We analyze their scheme for the security against known attacks. Though their scheme is efficient in computation, in this paper we show that their scheme has some security pitfalls such as (1) it is not resilient against node capture attack, (2) it is insecure against impersonation attack, (3) it is insecure against man-in-the-middle attack, and (4) it is also insecure against privileged insider attack. Finally, we give some pointers for improving their scheme so that the designed scheme needs to be secure against various known attacks.

Cite

CITATION STYLE

APA

Das, A. K. (2014). Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks. In Communications in Computer and Information Science (Vol. 467, pp. 1–9). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free