Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
Chenyu WangDing WangYi TuGuoai XuHuaxiong WangPublished in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
- user authentication
- password guessing
- wireless sensor networks
- remote user authentication scheme
- malicious nodes
- key management scheme
- smart card
- authentication scheme
- keystroke dynamics
- node selection
- biometric authentication
- information security
- routing algorithm
- graphical password
- key management
- authentication protocol
- network nodes
- biometric systems
- energy consumption
- information systems
- resource constrained
- sensor networks
- high resolution