An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT

6Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.’s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts.

References Powered by Scopus

Two-factor user authentication in wireless sensor networks

651Citations
N/AReaders
Get full text

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

613Citations
N/AReaders
Get full text

Provably secure password-authenticated key exchange using Diffie-Hellman

561Citations
N/AReaders
Get full text

Cited by Powered by Scopus

ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

18Citations
N/AReaders
Get full text

A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments

18Citations
N/AReaders
Get full text

A Secure IoT Based Wireless Sensor Network for an Efficient Modified User Authentication and Key Agreement Scheme

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Tyagi, P., Kumari, S., Alzahrani, B. A., Gupta, A., & Yang, M. H. (2022). An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. Sensors, 22(22). https://doi.org/10.3390/s22228793

Readers' Seniority

Tooltip

Lecturer / Post doc 2

40%

PhD / Post grad / Masters / Doc 2

40%

Professor / Associate Prof. 1

20%

Readers' Discipline

Tooltip

Computer Science 5

100%

Save time finding and organizing research with Mendeley

Sign up for free