4.6 Article

An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network

Journal

IEEE ACCESS
Volume 8, Issue -, Pages 73182-73192

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.2987764

Keywords

Protocols; Wireless sensor networks; Authentication; Logic gates; Elliptic curves; Wireless communication; Authentication; wireless sensor networks; key agreement; ECDH; security; privacy

Ask authors/readers for more resources

Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie & x2013;Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available