Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-efficient authentication protocols is a very important issue in wireless sensor network security. Recently, Amin et al. presented an untraceable and anonymous three-factor authentication (3FA) scheme for HWSNs and argued that their protocol is efficient and can withstand the common security threats in this sort of networks. In this article, we show how their protocol is not immune to user impersonation, de-synchronization and traceability attacks....
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
Key agreements that use only password authentication are convenient in communication networks, but t...
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as ...
The wireless sensor network is a network composed of sensor nodes self-organizing through the applic...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Recently, wireless sensor networks (WSNs) have been widely used in a variety of fields, and make peo...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and a...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
Understanding security failures of cryptographic protocols is the key to both patching existing prot...
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
Key agreements that use only password authentication are convenient in communication networks, but t...
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as ...
The wireless sensor network is a network composed of sensor nodes self-organizing through the applic...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Recently, wireless sensor networks (WSNs) have been widely used in a variety of fields, and make peo...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and a...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
Understanding security failures of cryptographic protocols is the key to both patching existing prot...
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
Key agreements that use only password authentication are convenient in communication networks, but t...