Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs.
Jiping LiYaoming DingZenggang XiongShouyin LiuHonglai LiPublished in: J. Commun. (2016)
Keyphrases
- mutual authentication
- secret key
- key agreement
- key management
- wireless sensor networks
- security analysis
- smart card
- authentication scheme
- privacy protection
- authentication protocol
- secure communication
- rfid tags
- public key
- key distribution
- sensor nodes
- hash functions
- data collection
- diffie hellman
- energy consumption
- security properties
- sensor networks
- ciphertext
- encryption scheme
- resource constrained
- wireless ad hoc networks
- lightweight
- trusted third party
- key agreement protocol
- privacy preserving
- digital signature
- elliptic curve
- security services
- security requirements