By Topic

Cryptanalysis of robust mutual authentication protocol for wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Eun-Jun Yoon ; Sch. of Comput. Sci. & Eng., Kyungpook Nat. Univ., Daegu, South Korea ; Kee-Young Yoo

Wireless sensor network (WSN) have been applied in many different areas. Mutual authentication is an important service in WSN. In 2010, Chen and Shih proposed a robust mutual authentication (RMA) protocol for WSN. However, this paper points out that Chen-Shih's RMA protocol has some drawbacks: (1) user impersonation attacks by a malicious registered user, (2) GW-node impersonation attacks by a malicious registered user, (3) sensor node impersonation attacks by a malicious registered user, (4) privileged insider attacks, and (5) time synchronization problem.

Published in:

Cognitive Informatics & Cognitive Computing (ICCI*CC ), 2011 10th IEEE International Conference on

Date of Conference:

18-20 Aug. 2011