An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. D...
Gespeichert in:
Veröffentlicht in: | IEEE access 2020, Vol.8, p.73182-73192 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2020.2987764 |