On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Da-Zhi SunJian-Xin LiZhiyong FengZhen-Fu CaoGuangquan XuPublished in: Pers. Ubiquitous Comput. (2013)
Keyphrases
- authentication scheme
- user authentication
- wireless sensor networks
- key management
- security analysis
- elliptic curve cryptography
- image encryption
- smart card
- information security
- security flaws
- secret key
- authentication protocol
- image authentication
- public key
- high security
- sensor nodes
- biometric systems
- intrusion detection
- key agreement
- mutual authentication
- password guessing
- knn
- sensor networks
- real time
- security requirements
- routing protocol