A dynamic user authentication scheme for wireless sensor networks

KHM Wong, Y Zheng, J Cao… - … conference on sensor …, 2006 - ieeexplore.ieee.org
In this paper, we consider user authentication (UA) for wireless sensor networks. UA is a
fundamental issue in designing dependable and secure systems. Imagine that a wireless …

An improved dynamic user authentication scheme for wireless sensor networks

HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …

Two-factor mutual authentication based on smart cards and passwords

G Yang, DS Wong, H Wang, X Deng - Journal of computer and system …, 2008 - Elsevier
One of the most commonly used two-factor user authentication mechanisms nowadays is
based on smart-card and password. A scheme of this type is called a smart-card-based …

Improved two-factor user authentication in wireless sensor networks

B Vaidya, D Makrakis… - 2010 IEEE 6th International …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are considered due to the ubiquitous nature, ease of
deployment, and wide range of possible applications. WSNs can be deployed in unattended …

Two‐factor mutual authentication with key agreement in wireless sensor networks

B Vaidya, D Makrakis, H Mouftah - Security and …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended
environments, where a registered user can log in to the network and access data collected …

Integrated OTP-based user authentication scheme using smart cards in home networks

J Jeong, MY Chung, H Choo - Proceedings of the 41st Annual …, 2008 - ieeexplore.ieee.org
In this paper, we propose a new user authentication (UA) scheme based on one-time
password (OTP) protocol using smart cards for home networks. The proposed scheme is to …

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

R Fan, D He, X Pan, L Ping - Journal of Zhejiang University SCIENCE C, 2011 - Springer
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN

B Vaidya, JJ Rodrigues, JH Park - International Journal of …, 2010 - Wiley Online Library
Owing to the ubiquitous nature, ease of deployment, and wide range of potential
applications, wireless sensor networks (WSNs) have received a lot of attention recently …

New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange

EJ Yoon, KY Yoo - Cryptology and Network Security: 4th International …, 2005 - Springer
Abstract In 2004, Wu-Chieu proposed improvements to their original authentication scheme
in order to strengthen it to withstand impersonation attacks. In 2005, Lee-Lin-Chang …

[PDF][PDF] A survey of access control schemes in wireless sensor networks

Y Faye, I Niang, T Noel - Proc. World Acad. Sci. Eng. Tech, 2011 - academia.edu
Access control is a critical security service in Wire-less Sensor Networks (WSNs). To prevent
malicious nodes from joining the sensor network, access control is required. On one hand …