[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of securi...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...
Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensur...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
With wireless sensor networks (WSNs), a driver can access various useful information for convenient ...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
The wireless sensor network is a network composed of sensor nodes self-organizing through the applic...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increas...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...
Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensur...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
With wireless sensor networks (WSNs), a driver can access various useful information for convenient ...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
The wireless sensor network is a network composed of sensor nodes self-organizing through the applic...
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless ...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increas...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...
Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensur...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...