An Authentication Scheme to Healthcare Security under Wireless Sensor Networks.
Tsung-Chih HsiaoYu-Ting LiaoJen-Yan HuangTzer-Shyong ChenGwoboa HorngPublished in: J. Medical Syst. (2012)
Keyphrases
- authentication scheme
- wireless sensor networks
- key management
- user authentication
- smart card
- elliptic curve cryptography
- security flaws
- security analysis
- secret key
- image encryption
- sensor networks
- key agreement
- authentication protocol
- resource constrained
- sensor nodes
- public key
- security requirements
- mutual authentication
- routing algorithm
- energy consumption
- provably secure
- high security
- intrusion detection
- computer networks
- image authentication
- routing protocol
- security model
- security protocols
- information security