Journal
IEEE ACCESS
Volume 8, Issue -, Pages 73182-73192Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.2987764
Keywords
Protocols; Wireless sensor networks; Authentication; Logic gates; Elliptic curves; Wireless communication; Authentication; wireless sensor networks; key agreement; ECDH; security; privacy
Ask authors/readers for more resources
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie & x2013;Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available