A Survey: Authentication Protocols & Security Analysis for Wireless Sensor Networks.
Sauhard VyasUsha JainGulrej AhmedPublished in: ICCCNT (2023)
Keyphrases
- security analysis
- authentication protocol
- wireless sensor networks
- public key
- smart card
- sensor networks
- security requirements
- user authentication
- energy consumption
- resource constrained
- encryption scheme
- key distribution
- security properties
- sensor nodes
- key management
- lightweight
- cryptographic protocols
- rfid systems
- routing protocol
- end to end
- high dimensional data
- private key
- key exchange