In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers- attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.-s scheme has some drawbacks: poor reparability problem, user impersonation attack, and sensor node impersonate attack
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
[[abstract]]Two-factor user authentication is an important research issue for providing security and...
In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentica...
Wireless sensor networks (WSNs) are applied widely a variety of areas such as real-time traffic moni...
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
User authentication in wireless sensor networks is more difficult than in traditional networks owing...
To keep a network secure, a user authentication scheme that allows only authenticated users to acces...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
Abstract- Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. D...
In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For ins...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
[[abstract]]Two-factor user authentication is an important research issue for providing security and...
In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentica...
Wireless sensor networks (WSNs) are applied widely a variety of areas such as real-time traffic moni...
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
User authentication in wireless sensor networks is more difficult than in traditional networks owing...
To keep a network secure, a user authentication scheme that allows only authenticated users to acces...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
Abstract- Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. D...
In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For ins...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
[[abstract]]Two-factor user authentication is an important research issue for providing security and...