@inproceedings{4fe66bc6f57b43eb8ba45577cc456b4a,
title = "Cryptanalysis of Kumar et al.{\textquoteright}s Authentication Protocol for Wireless Sensor Networks",
abstract = "Wireless sensor networks are popularly used for many applications to monitor environmental changes and track events. In 2019, Kumar et al. proposed a secure and efficient authentication scheme for coal mine monitoring using wireless sensor networking technology. In this paper, we analyze the security issues of Kumar et al.{\textquoteright}s authentication scheme. We found that Kumar et al.{\textquoteright}s has four security weaknesses: (1) sensor nodes{\textquoteright} critical information can be disclosed; (2) session keys can be compromised; (3) user impersonation is possible, and (4) users{\textquoteright} identity and password can be leaked with a stolen smart card.",
keywords = "Key agreement, Sensor network, User authentication, Wireless sensor network",
author = "Sewan Ha and Jihyeon Ryu and Hyoungshick Kim and Dongho Won and Youngsook Lee",
note = "Publisher Copyright: {\textcopyright} Springer Nature Singapore Pte Ltd 2020.; 10th International Conference on Information Science and Applications, ICISA 2019 ; Conference date: 16-12-2019 Through 18-12-2019",
year = "2020",
doi = "10.1007/978-981-15-1465-4\_34",
language = "English",
isbn = "9789811514647",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer",
pages = "329--340",
editor = "Kim, \{Kuinam J.\} and Hye-Young Kim",
booktitle = "Information Science and Applications, ICISA 2019",
address = "United States",
}