scispace - formally typeset
Search or ask a question
Topic

Lightweight Extensible Authentication Protocol

About: Lightweight Extensible Authentication Protocol is a research topic. Over the lifetime, 4165 publications have been published within this topic receiving 86429 citations. The topic is also known as: Leap & Lightweight Extensible Authentication Protocol.


Papers
More filters
Journal ArticleDOI
TL;DR: Two password authentication schemes with smart cards are proposed, in which users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users.

320 citations

Journal ArticleDOI
02 May 2011-Sensors
TL;DR: According to the analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements and is shown to be suitable for higher security WSNs.
Abstract: User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

316 citations

Patent
25 Jan 2007
TL;DR: In this paper, requests to gain access to secure resources are adjudicated according to authentication policies that include rules based on user-state derived from multiple heterogeneous access-control systems.
Abstract: Requests to gain access to secure resources are adjudicated according to authentication policies that include rules based on user-states derived from multiple heterogeneous access- control systems.

291 citations

Journal ArticleDOI
TL;DR: It is shown that the improved smart card authentication scheme proposed by Xu-Zhu-Feng is vulnerable to internal and impersonation attacks, and an improvement of their solution is proposed, and a new efficient strong smart card Authentication protocol is presented.

290 citations


Network Information
Related Topics (5)
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
86% related
Mobile computing
51.3K papers, 1M citations
86% related
Wireless network
122.5K papers, 2.1M citations
86% related
Encryption
98.3K papers, 1.4M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202328
202257
20212
20205
20198
201815