A dynamic user authentication scheme for wireless sensor networks
KHM Wong, Y Zheng, J Cao… - … on sensor networks …, 2006 - ieeexplore.ieee.org
… In this paper, we consider User Authentication (UA) for wireless sensor networks. UA is a …
dependable and secure systems. Imagine that a wireless sensor network is deployed in an …
dependable and secure systems. Imagine that a wireless sensor network is deployed in an …
A new and secure authentication scheme for wireless sensor networks with formal proof
… an improved authentication scheme and prove it to be secure with the formal security model.
… We show some assumptions to analyze the referred authentication schemes in this paper. …
… We show some assumptions to analyze the referred authentication schemes in this paper. …
User authentication schemes for wireless sensor networks: A review
… We focus only on user authentication schemes based on simple functions like one way
hash function (h(.)), exclusive or operation (⊕) and string concatenation operation (||). In this …
hash function (h(.)), exclusive or operation (⊕) and string concatenation operation (||). In this …
A light-weight authentication scheme for wireless sensor networks
… In this paper, a light-weight authentication model for wireless sensor networks composed
of a key management and an authentication protocol is presented. It is based on the use of …
of a key management and an authentication protocol is presented. It is based on the use of …
A two-factor security authentication scheme for wireless sensor networks in IoT environments
B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
… a two-factor authentication scheme based on elliptic curve … its security by formal verification
tool ProVerif. Compared with related schemes, our scheme provides higher level of security, …
tool ProVerif. Compared with related schemes, our scheme provides higher level of security, …
An authentication scheme to healthcare security under wireless sensor networks
TC Hsiao, YT Liao, JY Huang, TS Chen… - Journal of medical …, 2012 - Springer
… authentication technology background, and then compare other papers on user authentication…
a medical environment using a wireless sensor network is proposed and its application on …
a medical environment using a wireless sensor network is proposed and its application on …
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
… In order to counter those problems, we propose two authentication schemes for the wireless
sensor networks. The first scheme overcomes those weaknesses and it is as efficient as the …
sensor networks. The first scheme overcomes those weaknesses and it is as efficient as the …
A lightweight user authentication scheme for wireless sensor networks
O Cheikhrouhou, A Koubaa… - … on Computer Systems …, 2010 - ieeexplore.ieee.org
… authentication scheme in WSNs. Then, in Section ill, we present the network and intruder
model. In Section IV, we describe our proposed user authentication scheme. Then, we give a …
model. In Section IV, we describe our proposed user authentication scheme. Then, we give a …
An improved dynamic user authentication scheme for wireless sensor networks
HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
… suited for wireless sensor networks. Recently, Wong et al. proposed a dynamic user … user
authentication scheme that is built upon Wong et al.’s scheme. We point out that Wong et al.’s …
authentication scheme that is built upon Wong et al.’s scheme. We point out that Wong et al.’s …
Authentication schemes for wireless sensor networks
… limited sensor nodes in WSNs. In Section 4, an example wireless sensor network environment,
… to implement the different authentication schemes presented and to show each scheme’s …
… to implement the different authentication schemes presented and to show each scheme’s …
相关搜索
- wireless sensor networks secure authentication protocol
- wireless sensor networks security performance
- wireless sensor networks secure multimedia communications
- wireless sensor networks security analysis
- wireless sensor networks security and improvement
- wireless sensor networks user authentication scheme
- wireless sensor networks mutual authentication
- heterogeneous wireless sensor networks authentication scheme
- wireless sensor networks key agreement scheme
- wireless sensor networks strong authentication scheme
- mobile wireless sensor networks management scheme
- wireless sensor networks efficient scheme
- wireless sensor networks security frameworks
- wireless sensor networks healthcare security
- wireless sensor networks things security
- multi-gateway wireless sensor networks