Abstract

The emergence of the Internet of Things (IoT) is gradually changing people’s lives and is widely used in various fields. Wireless body area networks (WBAN) and vehicular ad-hoc networks (VANET) are typical examples of IoT applications. In both environments, an attacker can tamper, intercept, and eavesdrop on data transmitted in the public channel. Therefore, it is necessary to design authentication and key agreement (AKA) protocols to protect the communication of entities. Recently, Wu et al. proposed a novel AKA protocol in WBAN. Jagriti et al. proposed an anonymous AKA protocol in VANET. In this paper, we analyse of Wu et al.’s protocol and Jagriti et al.’s protocol, respectively. Unfortunately, we find that Wu et al.’s protocol cannot resist sensor node capture attacks, and Jagriti et al.’s protocol cannot resist session key disclosure attacks, on board unit (OBU) capture attacks, and man-in-the-middle attacks. Finally, we propose some suggestions for the two protocols.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call