SPINS: security protocols for sensor networks
Wireless Networks
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A Dynamic User Authentication Scheme for Wireless Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
Advanced smart card based password authentication protocol
Computer Standards & Interfaces
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
An efficient and lightweight user authentication scheme for wireless sensor networks
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Journal of Medical Systems
Journal of Network and Computer Applications
Personal and Ubiquitous Computing
Journal of Medical Systems
Hi-index | 0.01 |
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.