An Efficient Scheme for User Authentication in Wireless Sensor Networks
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
A remote user authentication scheme without using smart cards
Computer Standards & Interfaces
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
On the anonymity of some authentication schemes for wireless communications
IEEE Communications Letters
Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
An improvement of secure authentication scheme with full anonymity for wireless communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Authentication and privacy are the two imperative security requirements by every wireless networks. Only recently, Vaidya, Rodrigues and Park proposed two low-cost authentication schemes with user privacy for wireless sensor networks (WSNs). However, this paper shows Vaidya et al.'s schemes cannot provide privacy in the presence of an adversary as they claim. Also, Vaidya et al.'s schemes are vulnerable to offline password guessing attack. To overcome these weaknesses, this paper improves their profound authentication schemes. The security of the improved scheme is analysed which reveals that the improved scheme can overcome such weaknesses. The performance of the improved scheme is the same as Vaidya et al.'s schemes with the same simplicity as well as being still suitable for WSNs.