Skip to main navigation Skip to search Skip to main content

Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless sensor networks are popularly used for many applications to monitor environmental changes and track events. In 2019, Kumar et al. proposed a secure and efficient authentication scheme for coal mine monitoring using wireless sensor networking technology. In this paper, we analyze the security issues of Kumar et al.’s authentication scheme. We found that Kumar et al.’s has four security weaknesses: (1) sensor nodes’ critical information can be disclosed; (2) session keys can be compromised; (3) user impersonation is possible, and (4) users’ identity and password can be leaked with a stolen smart card.

Original languageEnglish
Title of host publicationInformation Science and Applications, ICISA 2019
EditorsKuinam J. Kim, Hye-Young Kim
PublisherSpringer
Pages329-340
Number of pages12
ISBN (Print)9789811514647
DOIs
StatePublished - 2020
Event10th International Conference on Information Science and Applications, ICISA 2019 - Seoul, Korea, Republic of
Duration: 16 Dec 201918 Dec 2019

Publication series

NameLecture Notes in Electrical Engineering
Volume621
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference10th International Conference on Information Science and Applications, ICISA 2019
Country/TerritoryKorea, Republic of
CitySeoul
Period16/12/1918/12/19

Keywords

  • Key agreement
  • Sensor network
  • User authentication
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Cryptanalysis of Kumar et al.’s Authentication Protocol for Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this