[[abstract]]Two-factor user authentication is an important research issue for providing security and privacy in hierarchical wireless sensor networks (HWSNs). In 2012, Das, Sharma, Chatterjee and Sing proposed a dynamic password-based user authentication scheme for HWSNs. In this paper, we show weaknesses of Das et al.'s scheme such as failing to prevent user clone and disclosing of base station's secret key. Therefore, we suggest a simple countermeasure to prevent proposed attacks while the merits of Das, et al.'s authentication scheme are left unchanged
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. I...
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as ...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Understanding security failures of cryptographic protocols is the key to both patching existing prot...
Key agreements that use only password authentication are convenient in communication networks, but t...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For ins...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
Abstract- Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. D...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, 5...
[[abstract]]"Wireless sensor networks (WSN) are typically deployed in an unattended environment, whe...
Secure communication is a significant issue in wireless sensor networks. User authentication and key...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. I...
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as ...
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unat...
Understanding security failures of cryptographic protocols is the key to both patching existing prot...
Key agreements that use only password authentication are convenient in communication networks, but t...
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to ...
In recent years, wireless sensor networks (WSNs) have been widely used in different domains. For ins...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
Abstract- Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. D...
In the wireless sensor networks (WSNs), users sometimes need to access real-time information from a ...
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, 5...
[[abstract]]"Wireless sensor networks (WSN) are typically deployed in an unattended environment, whe...
Secure communication is a significant issue in wireless sensor networks. User authentication and key...
[[abstract]]In recent years, wireless sensor networks (WSNs), widely used in many fields, have attra...
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. I...
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as ...