User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also effici...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Key agreements that use only password authentication are convenient in communication networks, but t...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
[[abstract]]"Wireless sensor networks (WSN) are typically deployed in an unattended environment, whe...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Key agreements that use only password authentication are convenient in communication networks, but t...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
[[abstract]]"Wireless sensor networks (WSN) are typically deployed in an unattended environment, whe...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Das first proposed two-factor authentication combining the smart card and password to resolve the se...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...