Title
Two-factor user authentication in wireless sensor networks
Abstract
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Year
DOI
Venue
2009
10.1109/TWC.2008.080128
IEEE Transactions on Wireless Communications
Keywords
Field
DocType
gateway node,unattended environment,two-factor user authentication protocol,legitimate user,wireless sensor network,accessing data,access data,two-factor user authentication,resource-constrained environment,user authentication,strong authentication,protocols,hash function,sensor networks,sensor network,security,hashing,environmental economics,authentification,sensor array,access network,wireless network,message authentication,authentication,cryptographic protocols,cryptography,signal detection,smart cards,wireless sensor networks,remote sensing
Lightweight Extensible Authentication Protocol,Key distribution in wireless sensor networks,Challenge-Handshake Authentication Protocol,Wireless security,Computer security,Computer network,Authentication protocol,Strong authentication,Wireless sensor network,Multi-factor authentication,Mathematics
Journal
Volume
Issue
ISSN
8
3
1536-1276
Citations 
PageRank 
References 
233
8.58
10
Authors
2
Search Limit
100233
Name
Order
Citations
PageRank
Manik Lal Das173159.71
DasManik Lal22348.93