Popis: |
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods. |