A two-factor security authentication scheme for wireless sensor networks in IoT environments
B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
As an important part of the Internet of Things, wireless sensor networks have been widely
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …
range of industries such as agriculture and military. However, designing a secure and …
On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks
The Internet of Thing (IoT) is useful for connecting and collecting variable data of objects
through the Internet, which makes to generate useful data for humanity. An indispensable …
through the Internet, which makes to generate useful data for humanity. An indispensable …
A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things
H Khemissa, D Tandjaoui - 2016 Wireless telecommunications …, 2016 - ieeexplore.ieee.org
The evolution of Internet of Things (IoT) is changing traditional perceptions of the current
Internet towards a vision of smart objects interacting with each other. Wireless Sensor …
Internet towards a vision of smart objects interacting with each other. Wireless Sensor …
A novel three-factor authentication protocol for wireless sensor networks with IoT notion
F Wu, X Li, L Xu, P Vijayakumar… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
As an important topic of IoT, wireless sensor network (WSN) data transmission is popular
nowadays. It is widely accepted that the wireless channel is hazard, and multifactor …
nowadays. It is widely accepted that the wireless channel is hazard, and multifactor …
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …
various events in the surrounding environment and report back to the base station. Sensor …
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
Abstract The notion Internet of Things (IoT) means all things in the global network can be
interconnected and accessed. Wireless sensor network (WSN) is one of the most important …
interconnected and accessed. Wireless sensor network (WSN) is one of the most important …
SLUA-WSN: Secure and lightweight three-factor-based user authentication protocol for wireless sensor networks
SJ Yu, YH Park - sensors, 2020 - mdpi.com
Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited
storage, computation, power, and communication capabilities and are widely used in …
storage, computation, power, and communication capabilities and are widely used in …
An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks
WL Tai, YF Chang, WH Li - Journal of Information Security and Applications, 2017 - Elsevier
In 2014, Turkanović et al. applied the Internet of Things (IoT) notion to wireless sensor
networks (WSNs) and proposed a user authentication and key agreement scheme for …
networks (WSNs) and proposed a user authentication and key agreement scheme for …
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
In current times, multimedia application includes integrated sensors, mobile networks and
Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much …
Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much …
相关搜索
- security authentication scheme
- wireless sensor networks
- user anonymity agreement scheme
- user anonymity iot notion
- efficient authentication iot deployment
- iot notion agreement scheme
- iot notion authentication protocol
- things security privacy preserving
- authentication scheme internet of things
- efficient authentication agreement scheme
- iot deployment agreement scheme