Skip to main navigation Skip to search Skip to main content

Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Access and connectivity to everything on the Inter-net of Things are closely tied to the wireless sensor network environment. In an IoT environment, a user can access a desired single sensor node without first connecting to the gateway node. Chen et al. proposed an efficient and safe protocol in this environment. Unfortunately, their plans have security weakness.We describe the protocol proposed by Chen et al. and describe two attack techniques for that protocol. The first is that it is vulnerable to password guessing attacks. Also, their protocols cannot defend against session key attacks. Finally, this paper proves that the target protocol is unsafe.

Original languageEnglish
Title of host publicationProceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020
EditorsSukhan Lee, Hyunseung Choo, Roslan Ismail
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728154534
DOIs
StatePublished - Jan 2020
Event14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020 - Taichung, Taiwan, Province of China
Duration: 3 Jan 20205 Jan 2020

Publication series

NameProceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020

Conference

Conference14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020
Country/TerritoryTaiwan, Province of China
CityTaichung
Period3/01/205/01/20

Keywords

  • Internet of Things
  • Remote user authentication
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment'. Together they form a unique fingerprint.

Cite this