In 2016, Akansha S. et al. proposed an upgraded user authentication protocol.According to the implemented cryptanalysis on their scheme, some vulnerabilities have been found in registration and authentication part.In registra-tion part, the gateway uses generated value as secrecy and sends it to sensor node, which doesn't have infor-mation about received secret value and cannot verify its identity.In authentication part, user is unable to check legiti-macy of received session key generated by sensor node.Mainly, the protocol has been implemented using only one way hash function, XOR and concatenation operations, which is not adequate to provide authentication and confidentiality.In this paper, we suggest ECC-based user authentication scheme for WSNs, which eliminates the drawbacks of the previous scheme.The protocol decreases the high cost public-key operations of the sensor node and substitutes them with symmetric-key based operations.
Amira MnifOmar CheikhrouhouMaher Ben Jemaa
Junghyun NamMoonseong KimJuryon PaikYoungsook LeeDongho Won