User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition.
Anup Kumar MauryaV. N. SastryPublished in: SSCC (2017)
Keyphrases
- user authentication
- scheme for wireless sensor networks
- data aggregation
- stream cipher
- wireless sensor networks
- security analysis
- authentication scheme
- key management
- keystroke dynamics
- information security
- authentication protocol
- biometric systems
- mobile devices
- public key
- secret key
- information systems
- energy efficient
- smart card
- low cost
- sensor networks
- feature extraction