Abstract | ||
---|---|---|
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/TWC.2008.080128 | IEEE Transactions on Wireless Communications |
Keywords | Field | DocType |
gateway node,unattended environment,two-factor user authentication protocol,legitimate user,wireless sensor network,accessing data,access data,two-factor user authentication,resource-constrained environment,user authentication,strong authentication,protocols,hash function,sensor networks,sensor network,security,hashing,environmental economics,authentification,sensor array,access network,wireless network,message authentication,authentication,cryptographic protocols,cryptography,signal detection,smart cards,wireless sensor networks,remote sensing | Lightweight Extensible Authentication Protocol,Key distribution in wireless sensor networks,Challenge-Handshake Authentication Protocol,Wireless security,Computer security,Computer network,Authentication protocol,Strong authentication,Wireless sensor network,Multi-factor authentication,Mathematics | Journal |
Volume | Issue | ISSN |
8 | 3 | 1536-1276 |
Citations | PageRank | References |
233 | 8.58 | 10 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Manik Lal Das | 1 | 731 | 59.71 |
DasManik Lal | 2 | 234 | 8.93 |