C
Chenyu Wang
Researcher at Beijing University of Posts and Telecommunications
Publications - 23
Citations - 348
Chenyu Wang is an academic researcher from Beijing University of Posts and Telecommunications. The author has contributed to research in topics: Computer science & Forward secrecy. The author has an hindex of 7, co-authored 11 publications receiving 174 citations.
Papers
More filters
Journal ArticleDOI
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
TL;DR: This article investigates the various causes and consequences of node capture attacks, and classify them into ten different types in terms of the attack targets, adversary’s capabilities and vulnerabilities exploited, and conducts a large-scale comparative measurement of 61 representative user authentication schemes for WSNs under the extended evaluation criteria.
Journal ArticleDOI
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Chenyu Wang,Guoai Xu,Jing Sun +2 more
TL;DR: This work demonstrated that biometric-based schemes proposed with confidence to be resistant to the known attacks suffer from various attacks, and proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis.
Journal ArticleDOI
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
Ding Wang,Ping Wang,Chenyu Wang +2 more
TL;DR: A robust multi-factor authentication scheme that makes use of the imbalanced computational nature of the RSA cryptosystem, particularly suitable for scenarios where sensor nodes (but not the user’s device) are the main energy bottleneck is proposed.
Journal ArticleDOI
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
TL;DR: Wang et al. as mentioned in this paper proposed an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally proved its security in the random oracle model.
Journal ArticleDOI
A lightweight password-based authentication protocol using smart card
TL;DR: It is shown that the scheme of Maitra et al is not secure enough as claimed: neither resisting against off‐line password guessing attack and insider attack nor preserve forward secrecy, and a new way is shown to achieve forward secrecy.