A Secure Authentication Scheme based on Brownian Motion in hierarchy Wireless Sensor Networks.
Trong-Minh HoangLe Van NgocTuan-Nguyen LangDang-Hai HoangPublished in: EAI Endorsed Trans. Ind. Networks Intell. Syst. (2019)
Keyphrases
- authentication scheme
- brownian motion
- wireless sensor networks
- key management
- stochastic process
- differential equations
- diffusion process
- smart card
- optimal control
- user authentication
- poisson process
- stochastic processes
- resource constrained
- heavy traffic
- vector valued
- secret key
- energy consumption
- security flaws
- sensor networks
- public key
- queue length
- sensor nodes
- authentication protocol
- markov chain
- closed form solutions
- security analysis
- lightweight
- security protocols
- key distribution
- inventory level
- wavelet transform
- security mechanisms
- steady state
- closed form
- asymptotically optimal