ECC based Authentication Scheme for Wireless Sensor Networks

This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). This protocol allows for the revocation of smart cards and prevents cloning attacks.

Weitere Produkte vom selben Autor

Design und Herstellung einer Microstrippatch-Antenne Singh Heer, Mandeep, Sharma, Vikrant

91,90 €*
Wormhole Isolation Method in MANET using Threshold Technique Sharma, Vikrant, Vasudev, Rajiv, Singh, Gagandeep

84,90 €*