Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
Ashok Kumar DasSantanu ChatterjeeJamuna Kanta SingPublished in: Int. J. Trust. Manag. Comput. Commun. (2014)
Keyphrases
- security analysis
- user authentication
- authentication scheme
- high security
- wireless sensor networks
- smart card
- image encryption
- public key
- authentication protocol
- security requirements
- key exchange
- security model
- elliptic curve cryptography
- security properties
- mutual authentication
- encryption scheme
- formal methods
- routing protocol
- high dimensional
- web services
- password guessing
- security mechanisms
- resource constrained
- security policies
- energy consumption
- software development
- sensor networks
- similarity measure