Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment
Abstract
References
Recommendations
Secure Protocol for Resource-Constrained IoT Device Authentication
Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been deployed in numerous fields such as battlefield surveillance. The exploitation of broadcasts in WSNs renders these networks susceptible to numerous ...
A lightweight security scheme to defend against quantum attack in IoT-based energy internet
The internet of things (IoT)-based energy internet (EI) is an emerging technology that enables innovative and distributed energy networks. However, as merging technologies often create complex structures, securing IoT-based EI against cyber-attacks ...
Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
Turkanovic et al. (Ad Hoc Netw 20:96---112, 2014) proposed a user authentication and key agreement scheme based on the notion of the `internet of things' for wireless sensor network. Authors claimed that their scheme is safe against various attacks. We ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 28Total Downloads
- Downloads (Last 12 months)19
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format