In Wireless Sensor Networks (WSNs), the real-time data which is highly sensitive, collected by sensor nodes. If anyone acquires this real-time information illegally, then the privacy will be revealed. Therefore, privacy, authentication, and data security are extremely important to access real-time information over an unreliable channel. Authentication is most common security mechanism to protect WSNs data over an untrustworthy network. Recently, Amin-Biswas devised two-factor remote user authentication protocol for WSNs and declared that it is safe from various security threats. However, we identified that their scheme has several security threats like password-guessing, identity-guessing, user-impersonation, session-key temporary information, smart card theft, and lack of forward-secrecy property. The computation cost, smartcard storage cost, and communication cost are also presented in the section of performance comparison.
CITATION STYLE
Chandrakar, P., & Ali, R. (2021). Cryptanalysis of Two-Factor Remote User Authentication Scheme for Wireless Sensor Networks. In Advances in Intelligent Systems and Computing (Vol. 1183, pp. 510–519). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-5856-6_50
Mendeley helps you to discover research relevant for your work.