Abstract

With the development of the Internet of Things (IOT), peoples’ lifestyle and social inter-communication have been changed greatly. As a part of the IOT, wireless sensor network (WSN) also attracts many researchers to pay close attention. In this paper, we investigate one latest scheme (Farash et al.’s scheme) that provides an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. However, we find some shortcomings and weaknesses in this scheme. It cannot supply anonymity for users and sensors and cannot protect stolen smart card attack. So our work is to eliminate the threat of cryptographic attack and to improve security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call