Ghani, AnwarMansoor, KhwajaMehmood, ShahidChaudhry, Shehzad AshrafRahman, Arif UrSaqib, Malik Najmus2019-09-302019-09-3020191074-53511099-1131https://hdl.handle.net/11363/1467https://doi.org/Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource-limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key-based authentication protocol for IoT-based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.eninfo:eu-repo/semantics/openAccessAttribution-NonCommercial-NoDerivs 3.0 United Statesauthentication protocolIoTkey agreementsymmetric encryptionWSNBODY AREA NETWORKSMUTUAL AUTHENTICATIONUSER AUTHENTICATIONAGREEMENT SCHEMEEFFICIENTINTERNETSecurity and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric KeyArticle10.1002/dac.41392-s2.0-85072221928Q2