作者: Jaewook Jung , Jongho Moon , Donghoon Lee , Dongho Won
DOI: 10.3390/S17030644
关键词:
摘要: At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques construct efficient, robust WSNs. Chang et al. recently presented mechanism for WSNs claimed that their both prevent various types of attacks, as well preserve security properties. However, we discovered al’s method possesses some weaknesses. First, cannot guarantee protection against password guessing attack, user impersonation attack or session compromise. Second, the results high load on gateway node because should always maintain verifier tables. Third, there is no verification process phase. To this end, describe how previously-stated weaknesses occur propose security-enhanced version We present detailed analysis performance our mechanism, which not only enhances compared related schemes, but also takes efficiency into consideration.