An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Fan WuLili XuSaru KumariXiong LiPublished in: Peer-to-Peer Netw. Appl. (2018)
Keyphrases
- scheme for wireless sensor networks
- key management
- provably secure
- user authentication
- authentication scheme
- wireless sensor networks
- secret key
- authentication protocol
- resource constrained
- security protocols
- ad hoc networks
- security analysis
- key distribution
- secret sharing scheme
- data aggregation
- information security
- elliptic curve
- real time
- smart card
- energy consumption
- knn