Login / Signup
An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs.
Boqing Zhou
Sujun Li
Weiping Wang
Jianxin Wang
Yun Cheng
Jie Wu
Published in:
IEEE Internet Things J. (2019)
Keyphrases
</>
authentication scheme
secret key
smart card
knowledge management
public key
security flaws
information systems
distributed systems
authentication protocol
image authentication
ciphertext
user authentication
image encryption