Title | ||
---|---|---|
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. |
Abstract | ||
---|---|---|
•We observed that Farash et al.’s authentication protocol for WSN is susceptible to many security attacks.•The protocol is also unable to preserve user anonymity.•We designed an anonymity preserving authentication scheme for WSN.•We analyze the security of the proposed protocol using AVISPA S/W.•The proposed protocol is secure against active and passive attacks and more efficient than other protocols. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1016/j.comnet.2016.01.006 | Computer Networks |
Keywords | Field | DocType |
Anonymity preserving,Key exchange protocol,Wireless sensor network,Internet of Things,Sensor node,Gateway node | Wide Mouth Frog protocol,Challenge-Handshake Authentication Protocol,Cryptographic protocol,Oakley protocol,Computer science,Computer security,Otway–Rees protocol,Computer network,Authentication protocol,Reflection attack,Internet Protocol Control Protocol | Journal |
Volume | Issue | ISSN |
101 | C | 1389-1286 |
Citations | PageRank | References |
47 | 0.99 | 28 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ruhul Amin | 1 | 614 | 31.66 |
Sk Hafizul Islam | 2 | 589 | 36.74 |
G. P. Biswas | 3 | 459 | 21.96 |
Muhammad Khurram Khan | 4 | 3538 | 204.81 |
Lu Leng | 5 | 200 | 9.83 |
Neeraj Kumar | 6 | 2889 | 236.13 |