A dynamic user authentication scheme for wireless sensor networks

KHM Wong, Y Zheng, J Cao… - … on sensor networks …, 2006 - ieeexplore.ieee.org
… In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a …
dependable and secure systems. Imagine that a wireless sensor network is deployed in an …

A new and secure authentication scheme for wireless sensor networks with formal proof

F Wu, L Xu, S Kumari, X Li - Peer-to-Peer Networking and Applications, 2017 - Springer
… an improved authentication scheme and prove it to be secure with the formal security model.
… We show some assumptions to analyze the referred authentication schemes in this paper. …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
… We focus only on user authentication schemes based on simple functions like one way
hash function (h(.)), exclusive or operation (⊕) and string concatenation operation (||). In this …

A light-weight authentication scheme for wireless sensor networks

O Delgado-Mohatar, A Fúster-Sabater, JM Sierra - Ad Hoc Networks, 2011 - Elsevier
… In this paper, a light-weight authentication model for wireless sensor networks composed
of a key management and an authentication protocol is presented. It is based on the use of …

A two-factor security authentication scheme for wireless sensor networks in IoT environments

B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
… a two-factor authentication scheme based on elliptic curve … its security by formal verification
tool ProVerif. Compared with related schemes, our scheme provides higher level of security, …

An authentication scheme to healthcare security under wireless sensor networks

TC Hsiao, YT Liao, JY Huang, TS Chen… - Journal of medical …, 2012 - Springer
authentication technology background, and then compare other papers on user authentication
a medical environment using a wireless sensor network is proposed and its application on …

A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

CC Chang, HD Le - IEEE Transactions on wireless …, 2015 - ieeexplore.ieee.org
… In order to counter those problems, we propose two authentication schemes for the wireless
sensor networks. The first scheme overcomes those weaknesses and it is as efficient as the …

A lightweight user authentication scheme for wireless sensor networks

O Cheikhrouhou, A Koubaa… - … on Computer Systems …, 2010 - ieeexplore.ieee.org
authentication scheme in WSNs. Then, in Section ill, we present the network and intruder
model. In Section IV, we describe our proposed user authentication scheme. Then, we give a …

An improved dynamic user authentication scheme for wireless sensor networks

HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
… suited for wireless sensor networks. Recently, Wong et al. proposed a dynamic user … user
authentication scheme that is built upon Wong et al.’s scheme. We point out that Wong et al.’s …

Authentication schemes for wireless sensor networks

A Tajeddine, A Kayssi, A Chehab… - MELECON 2014-2014 …, 2014 - ieeexplore.ieee.org
… limited sensor nodes in WSNs. In Section 4, an example wireless sensor network environment,
… to implement the different authentication schemes presented and to show each scheme’s …