Cryptanalysis of Two-Factor Remote User Authentication Scheme for Wireless Sensor Networks

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Wireless Sensor Networks (WSNs), the real-time data which is highly sensitive, collected by sensor nodes. If anyone acquires this real-time information illegally, then the privacy will be revealed. Therefore, privacy, authentication, and data security are extremely important to access real-time information over an unreliable channel. Authentication is most common security mechanism to protect WSNs data over an untrustworthy network. Recently, Amin-Biswas devised two-factor remote user authentication protocol for WSNs and declared that it is safe from various security threats. However, we identified that their scheme has several security threats like password-guessing, identity-guessing, user-impersonation, session-key temporary information, smart card theft, and lack of forward-secrecy property. The computation cost, smartcard storage cost, and communication cost are also presented in the section of performance comparison.

Cite

CITATION STYLE

APA

Chandrakar, P., & Ali, R. (2021). Cryptanalysis of Two-Factor Remote User Authentication Scheme for Wireless Sensor Networks. In Advances in Intelligent Systems and Computing (Vol. 1183, pp. 510–519). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-5856-6_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free