{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:14:16Z","timestamp":1775013256971,"version":"3.50.1"},"reference-count":53,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000},"content-version":"vor","delay-in-days":105,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The wireless sensor network is a network composed of sensor nodes self\u2010organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three\u2010factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session\u2010specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross\u2010Abadii\u2010Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.<\/jats:p>","DOI":"10.1155\/2021\/5537018","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T20:22:34Z","timestamp":1618604554000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A Provably Secure Three\u2010Factor Authentication Protocol for Wireless Sensor Networks"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8970-2452","authenticated-orcid":false,"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9835-5111","authenticated-orcid":false,"given":"Lei","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8743-5290","authenticated-orcid":false,"given":"Zhiyuan","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2117-0618","authenticated-orcid":false,"given":"Shu-Chuan","family":"Chu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-5383","authenticated-orcid":false,"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5324-2156","authenticated-orcid":false,"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.01.006"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5574732"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.11.056"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6625184"},{"key":"e_1_2_10_5_2","first-page":"34","article-title":"A spatial correlation based partial coverage scheduling scheme in wireless sensor networks","volume":"5","author":"Zhang J.","year":"2020","journal-title":"Journal of Network Intelligence"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5734"},{"key":"e_1_2_10_7_2","first-page":"124","article-title":"The research of identity authentication based on multiple biometrics fusion in complex interactive environment","volume":"4","author":"Wang Y.","year":"2019","journal-title":"Journal of Network Intelligence"},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"ZengW.andZhangJ. Leakage-resilient and lightweight authenticated key exchange for e-health 2020 6th International Conference on Information Management (ICIM) 2020 London UK 162\u2013166.","DOI":"10.1109\/ICIM49319.2020.244691"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.026"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008955"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999510"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104049"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6658041"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"VaidyaB. MakrakisD. andMouftahH. T. Improved two-factor user authentication in wireless sensor networks 2010 IEEE 6th International Conference on Wireless and Mobile Computing Networking and Communications 2010 Niagara Falls ON Canada 600\u2013606.","DOI":"10.1109\/WIMOB.2010.5645004"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.517"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s140406443"},{"key":"e_1_2_10_20_2","doi-asserted-by":"crossref","unstructured":"HuangH.-F. ChangY.-F. andLiuC.-H. Enhancement of two-factor user authentication in wireless sensor networks 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2010 Darmstadt Germany 27\u201330.","DOI":"10.1109\/IIHMSP.2010.14"},{"key":"e_1_2_10_21_2","unstructured":"KumarP. SainM. andLeeH. J. An efficient two-factor user authentication framework for wireless sensor networks 13th International Conference on Advanced Communication Technology (ICACT2011) 2011 Gangwon Korea (South) 574\u2013578."},{"key":"e_1_2_10_22_2","unstructured":"WangF. ZhangY. XuY. WuL. andDiaoB. A dos-resilient enhanced two-factor user authentication scheme in wireless sensor networks 2014 International Conference on Computing Networking and Communications (ICNC) 2014 Honolulu HI USA 1096\u20131102."},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796539"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-010-0318-2"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"WongK. H. ZhengY. CaoJ. andWangS. A dynamic user authentication scheme for wireless sensor networks 1 IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing (SUTC\u201906) 2006 Taichung Taiwan.","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"YoonE.-J.andYooK.-Y. A new biometric-based user authentication scheme without using password for wireless sensor networks 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises 2011 Paris France 279\u2013284.","DOI":"10.1109\/WETICE.2011.47"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/407971"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2288-3"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2933"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/info8040136"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0485-9"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877690"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18124481"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2934947"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923777"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.2981049"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.3035566"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030520"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"e_1_2_10_40_2","article-title":"A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card","volume":"31","author":"Madhusudhan R.","year":"2018","journal-title":"International Journal of Communication Systems"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03548-9"},{"key":"e_1_2_10_42_2","doi-asserted-by":"crossref","unstructured":"GoldreichO.andHaleviS. The random oracle methodology revisited Proc. 30th ACM Symp. Theory of Computing 1998 Dallas TX USA 209\u2013218.","DOI":"10.1145\/276698.276741"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.09.004"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17071482"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923373"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3024654"},{"key":"e_1_2_10_47_2","first-page":"1","article-title":"Password-based authenticated key exchange from lattices for client server model","volume":"1","author":"Hsu J.-C.","year":"2021","journal-title":"Journal of Computer Security and Data Forensics"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02740-2"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"e_1_2_10_51_2","unstructured":"BlanchetB. SmythB. ChevalV. andSylvestreM. ProVerif 2.02 pl1: automatic cryptographic protocol verifier User Manual and Tutorial 2020 https:\/\/prosecco.gforge.inria.fr\/personal\/bblanche\/proverif\/manual.pdf."},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969986"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6627956"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5537018.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5537018.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5537018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:03:54Z","timestamp":1723032234000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5537018"}},"subtitle":[],"editor":[{"given":"Mattin Pirouz","family":"Nia","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5537018"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5537018","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-01-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5537018"}}