scispace - formally typeset
C

Chenyu Wang

Researcher at Beijing University of Posts and Telecommunications

Publications -  23
Citations -  348

Chenyu Wang is an academic researcher from Beijing University of Posts and Telecommunications. The author has contributed to research in topics: Computer science & Forward secrecy. The author has an hindex of 7, co-authored 11 publications receiving 174 citations.

Papers
More filters
Journal ArticleDOI

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks

TL;DR: This article investigates the various causes and consequences of node capture attacks, and classify them into ten different types in terms of the attack targets, adversary’s capabilities and vulnerabilities exploited, and conducts a large-scale comparative measurement of 61 representative user authentication schemes for WSNs under the extended evaluation criteria.
Journal ArticleDOI

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

TL;DR: This work demonstrated that biometric-based schemes proposed with confidence to be resistant to the known attacks suffer from various attacks, and proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis.
Journal ArticleDOI

Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs

TL;DR: A robust multi-factor authentication scheme that makes use of the imbalanced computational nature of the RSA cryptosystem, particularly suitable for scenarios where sensor nodes (but not the user’s device) are the main energy bottleneck is proposed.
Journal ArticleDOI

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

TL;DR: Wang et al. as mentioned in this paper proposed an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally proved its security in the random oracle model.
Journal ArticleDOI

A lightweight password-based authentication protocol using smart card

TL;DR: It is shown that the scheme of Maitra et al is not secure enough as claimed: neither resisting against off‐line password guessing attack and insider attack nor preserve forward secrecy, and a new way is shown to achieve forward secrecy.