A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments".
Zhengjun CaoLihua LiuPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- scheme for wireless sensor networks
- key management
- key distribution
- stream cipher
- wireless sensor networks
- resource constrained
- ad hoc networks
- security analysis
- authentication scheme
- security mechanisms
- security requirements
- security problems
- secret sharing scheme
- data aggregation
- secret key
- authentication mechanism
- private key
- security protocols
- fuzzy vault
- authentication protocol
- user authentication
- digital signature
- elliptic curve
- high security
- security issues
- integrity verification
- virtual private network
- data encryption
- information security
- low cost
- factor authentication
- end to end
- query processing
- biometric template
- intrusion detection
- routing protocol