Secure Authentication in Wireless Sensor Networks Using RF Fingerprints.
David A. KnoxThomas KunzPublished in: EUC (1) (2008)
Keyphrases
- wireless sensor networks
- key management
- key distribution
- security mechanisms
- resource constrained
- authentication mechanism
- user authentication
- authentication scheme
- password authentication
- integrity verification
- identity management
- data encryption
- authentication protocol
- biometric data
- factor authentication
- security analysis
- security services
- personal identification
- key exchange protocol
- image authentication
- biometric systems
- secret key
- cryptographic protocols
- key agreement protocol
- provably secure
- diffie hellman
- secret sharing scheme
- fingerprint matching
- public key infrastructure
- trusted third party
- security properties
- fingerprint verification
- public key encryption