An efficient source authentication scheme in wireless sensor networks.
Wafa Ben JaballahAref MeddebHabib YoussefPublished in: AICCSA (2010)
Keyphrases
- authentication scheme
- wireless sensor networks
- key management
- smart card
- user authentication
- secret key
- image encryption
- public key
- security flaws
- sensor networks
- resource constrained
- sensor nodes
- authentication protocol
- energy consumption
- real time
- ad hoc networks
- routing algorithm
- routing protocol
- key distribution
- lightweight
- low cost