With the development of wireless communication technology, wireless sensor nodes that consume less batteries and have various functions are developing. And as the Internet of Things becomes more common, wireless sensor networks are being used in vario...
With the development of wireless communication technology, wireless sensor nodes that consume less batteries and have various functions are developing. And as the Internet of Things becomes more common, wireless sensor networks are being used in various fields, including military, reactor control systems, and medical monitoring. In particular, it plays an important role in collecting information in accordance with military law and personal information protection act within the region during military operations. As a result, various studies on wireless sensor networks have been conducted, among which research on security issues arising during authentication is aimed at reducing the overhead of computing power required for security while achieving security objectives.. Liu et al. proposed a temporary credential-based mutual authentication scheme by using multi-password in the process of generating session keys between users and sensor nodes. However, the scheme failed to guarantee anonymity, could be vulnerable to DoS attacks, vulnerabilities were found in communication between the user and the sensor node, and the session key of the sensor was exposed by the user. We propose a temporary credential-based mutual authentication scheme using multi-password with improved security to improve the county's password and authentication technology capabilities and analyze safety.