Abstract
Recently, Maitra et al. proposed an efficient and robust user authentication scheme for hierarchical wireless sensor networks. They claimed that their scheme does not need tamper-proof smart card and resisted different possible attacks include smart card stolen attack, impersonation attack, privileged insider attack, replay attack, off-line password guessing attack, theft attack, session key recovery attack, denial of service attack, and cluster head capture attack. However, we find some weaknesses of his scheme in this article. We show that their scheme is vulnerable to off-line password guessing with smart card stolen attack.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Mathematical Models and Methods in Applied Sciences
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.