Keyphrases
- authentication scheme
- wireless sensor networks
- key management
- smart card
- user authentication
- image encryption
- secret key
- sensor networks
- public key
- security flaws
- routing algorithm
- sensor nodes
- image authentication
- energy consumption
- authentication protocol
- coarse to fine
- security analysis
- routing protocol
- lightweight