{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:39:30Z","timestamp":1742398770546},"reference-count":48,"publisher":"Wiley","issue":"23","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2024,10,25]]},"abstract":"Summary<\/jats:title>The convergence of reliable and self\u2010organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring and so forth, yet has also led to significant security risks in their deployment. So, several researchers are developing efficient authentication frameworks with various security and privacy characteristics for WSNs. Subsequently, we review and examine a recently proposed robust key management protocol for an industrial sensor network system. However, their work is incompetent to proffer expedient security and is susceptible to several security attacks. We demonstrate their vulnerabilities against man\u2010in\u2010the\u2010middle attacks, privileged insider attacks, secret key leakage attacks, user, gateway, and sensor node impersonation attacks, and offline password\u2010guessing attacks. We further highlight the design flaw of no session key agreement in Itoo et al. Therefore to alleviate the existing security issues, we devise an improved key agreement and mutual authentication framework. Our protocol outperforms Itoo et al.'s drawbacks, as demonstrated by the comprehensive security proof performed using the real\u2010or\u2010random (ROR) model and the formal verification accomplished using the Automated Validation of Internet Security Protocols (AVISPA) tool.<\/jats:p>","DOI":"10.1002\/cpe.8250","type":"journal-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T01:21:25Z","timestamp":1722820885000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A provably secure authenticated key agreement protocol for industrial sensor network system"],"prefix":"10.1002","volume":"36","author":[{"given":"Garima","family":"Thakur","sequence":"first","affiliation":[{"name":"Srinivasa Ramanujan Department of Mathematics Central University of Himachal Pradesh Dharamshala India"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"Distinguished Professor at the King Abdullah II School of Information Technology The University of Jordan Amman Jordan"},{"name":"Jordan and School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China"},{"name":"Department of Computational Intelligence, School of Computing SRM University Kattankulathur Tamil Nadu India"},{"name":"School of Engineering The Amity University Noida Uttar Pradesh India"}]},{"given":"Piyush","family":"Sharma","sequence":"additional","affiliation":[{"name":"Srinivasa Ramanujan Department of Mathematics Central University of Himachal Pradesh Dharamshala India"}]},{"given":"Sunil","family":"Prajapat","sequence":"additional","affiliation":[{"name":"Srinivasa Ramanujan Department of Mathematics Central University of Himachal Pradesh Dharamshala India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4589-3573","authenticated-orcid":false,"given":"Pankaj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Srinivasa Ramanujan Department of Mathematics Central University of Himachal Pradesh Dharamshala India"}]}],"member":"311","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"volume-title":"In: 6th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. 13","year":"2005","author":"Khemapech I","key":"e_1_2_11_2_1"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"issue":"2","key":"e_1_2_11_4_1","first-page":"241","article-title":"A hybrid blockchain\u2010based identity authentication scheme for multi\u2010WSN","volume":"13","author":"Cui Z","year":"2020","journal-title":"IEEE Trans Serv Comput"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00464-9"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07527-4"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2974220"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000790"},{"key":"e_1_2_11_9_1","first-page":"1","article-title":"RKMIS: robust key management protocol for industrial sensor network system","author":"Itoo S","year":"2023","journal-title":"J Supercomput"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.09.020"},{"journal-title":"Trans Emerg Telecommun Technol","article-title":"A probably secure biometric\u2010based authentication and key agreement scheme for Internet of Drones","author":"Gautam D","key":"e_1_2_11_13_1"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3325130"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"e_1_2_11_16_1","article-title":"Improvement of Das's two\u2010factor authentication protocol in wireless sensor networks","author":"Nyang D","year":"2009","journal-title":"Crypto EPrint Arch"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.14"},{"issue":"4","key":"e_1_2_11_18_1","first-page":"361","article-title":"An enhanced two\u2010factor user authentication scheme in wireless sensor networks","volume":"10","author":"He D","year":"2010","journal-title":"Ad Hoc Sens Wirel Networks"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.517"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0404-5"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3717-7"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJACI.2019010106"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.003"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0485-9"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2933"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2288-3"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1604-0"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2136506"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20154143"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987764"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21030936"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01063-5"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/s141121023"},{"key":"e_1_2_11_36_1","first-page":"1","article-title":"An efficient key agreement and authentication protocol for secure communication in industrial IoT applications","author":"Vinoth R","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13101952"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17122946"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17030644"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16122123"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"e_1_2_11_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"e_1_2_11_46_1","first-page":"1","volume-title":"Proceedings of APPSEM 2005 Workshop APPSEM'05p","author":"Von Oheimb D","year":"2005"},{"key":"e_1_2_11_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"},{"key":"e_1_2_11_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"e_1_2_11_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2019.2905020"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.8250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T03:17:58Z","timestamp":1727320678000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.8250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":48,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2024,10,25]]}},"alternative-id":["10.1002\/cpe.8250"],"URL":"https:\/\/doi.org\/10.1002\/cpe.8250","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2023-12-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}