Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment

被引:7
|
作者
Ryu, Jihyeon [1 ]
Kim, Hyoungshick [1 ]
Lee, Youngsook [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon, South Korea
[2] Howon Univ, Cyber Secur, Gunsan, South Korea
基金
新加坡国家研究基金会;
关键词
Remote user authentication; Internet of Things; Wireless sensor network; KEY AGREEMENT SCHEME; USER AUTHENTICATION SCHEME;
D O I
10.1109/imcom48794.2020.9001674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access and connectivity to everything on the Internet of Things are closely tied to the wireless sensor network environment. In an IoT environment, a user can access a desired single sensor node without first connecting to the gateway node. Chen et al. proposed an efficient and safe protocol in this environment. Unfortunately, their plans have security weakness. We describe the protocol proposed by Chen et al. and describe two attack techniques for that protocol. The first is that it is vulnerable to password guessing attacks. Also, their protocols cannot defend against session key attacks. Finally, this paper proves that the target protocol is unsafe.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Optimization of Heterogeneous Clustering Routing Protocol for Internet of Things in Wireless Sensor Networks
    Yang, Shun
    Long, Xian'ai
    Peng, Hao
    Gao, Haibo
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [2] Wireless sensor networks and the Internet of Things
    Cama, Alejandro
    De la Hoz, Emiro
    Cama, Dora
    [J]. INGE CUC, 2012, 8 (01) : 163 - 172
  • [3] Wireless Sensor Networks and the Internet of Things
    Jiang, Yingtao
    Zhang, Lei
    Wang, Ling
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] Wireless Sensor Networks for the Internet of Things
    Zhan, Yongzhao
    Liu, Lu
    Wang, Liangmin
    Shen, Yulong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [5] Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands
    Kashi, Saeed Sedighian
    [J]. COMPUTING, 2019, 101 (04) : 363 - 385
  • [6] Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
    Neerul
    Kumar, Devender
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05)
  • [7] Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands
    Saeed Sedighian Kashi
    [J]. Computing, 2019, 101 : 363 - 385
  • [8] An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks
    Krishnan, Rajkumar
    Krishnan, R. Santhana
    Robinson, Y. Harold
    Julie, E. Golden
    Hoang Viet Long
    Sangeetha, A.
    Subramanian, M.
    Kumar, Raghvendra
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (04) : 3461 - 3483
  • [9] An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks
    Rajkumar Krishnan
    R. Santhana Krishnan
    Y. Harold Robinson
    E. Golden Julie
    Hoang Viet Long
    A. Sangeetha
    M. Subramanian
    Raghvendra Kumar
    [J]. Wireless Personal Communications, 2022, 124 : 3461 - 3483
  • [10] An Energy-Efficient Protocol for Internet of Things Based Wireless Sensor Networks
    Mustafa, Mohammed Mubarak
    Khalifa, Ahmed Abelmonem
    Cengiz, Korhan
    Ivkovic, Nikola
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2397 - 2412