Two-factor user authentication in wireless sensor networks
Top Cited Papers
- 16 March 2009
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Wireless Communications
- Vol. 8 (3), 1086-1090
- https://doi.org/10.1109/twc.2008.080128
Abstract
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.Keywords
This publication has 10 references indexed in Scilit:
- A Dynamic User Authentication Scheme for Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- One-Time Sensors: A Novel Concept to Mitigate Node-Capture AttacksLecture Notes in Computer Science, 2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- TinyPKPublished by Association for Computing Machinery (ACM) ,2004
- Security considerations for IEEE 802.15.4 networksPublished by Association for Computing Machinery (ACM) ,2004
- A dynamic ID-based remote user authentication schemeIEEE Transactions on Consumer Electronics, 2004
- Wireless Sensor NetworksPublished by Taylor & Francis ,2003
- Assessing Security in Energy-Efficient Sensor NetworksPublished by Springer Nature ,2003
- SPINS: Security Protocols for Sensor NetworksWireless Networks, 2002
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983