A new and secure authentication scheme for wireless sensor networks with formal proof.
Fan WuLili XuSaru KumariXiong LiPublished in: Peer-to-Peer Netw. Appl. (2017)
Keyphrases
- formal proof
- scheme for wireless sensor networks
- key management
- stream cipher
- key distribution
- security analysis
- authentication scheme
- secret key
- wireless sensor networks
- authentication mechanism
- user authentication
- theorem prover
- ad hoc networks
- resource constrained
- high security
- data aggregation
- security mechanisms
- secret sharing scheme
- integrity verification
- factor authentication
- password authentication
- identity management
- security requirements
- authentication protocol
- private key
- data encryption
- digital signature
- smart card
- security protocols
- secure manner
- image encryption
- public key
- rights management
- elliptic curve
- hash functions
- routing algorithm
- pseudorandom
- encryption scheme
- uniformly distributed
- security issues
- sensor nodes
- response time
- web services