User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authenticated querying is one of the prominent requirement of Internet of Things (IoT) or wireless networks of sensor devices to resist unauthorized users from accessing real time and confidential data. In this paper, we perform security analysis and find drawbacks of Das’s user authentication scheme (proposed in 2015). We propose an efficient authenticated key exchange mechanism using the concepts of the fuzzy extractor and Chinese Remainder Theorem. After that, we perform the security analysis of our scheme using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.

Cite

CITATION STYLE

APA

Maurya, A. K., & Sastry, V. N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. In Communications in Computer and Information Science (Vol. 746, pp. 79–94). Springer Verlag. https://doi.org/10.1007/978-981-10-6898-0_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free