scholarly journals A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Sensors ◽  
2011 ◽  
Vol 11 (5) ◽  
pp. 4767-4779 ◽  
Author(s):  
Hsiu-Lien Yeh ◽  
Tien-Ho Chen ◽  
Pin-Chuan Liu ◽  
Tai-Hoo Kim ◽  
Hsin-Wen Wei
Sensors ◽  
2014 ◽  
Vol 14 (6) ◽  
pp. 10081-10106 ◽  
Author(s):  
Younsung Choi ◽  
Donghoon Lee ◽  
Jiye Kim ◽  
Jaewook Jung ◽  
Junghyun Nam ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


Sign in / Sign up

Export Citation Format

Share Document