Secure Authentication in Wireless Sensor Networks Using RF Fingerprints.
David A. KnoxThomas KunzPublished in: EUC (1) (2008)
Keyphrases
- wireless sensor networks
- key management
- key distribution
- security mechanisms
- resource constrained
- authentication mechanism
- user authentication
- authentication scheme
- password authentication
- integrity verification
- identity management
- data encryption
- authentication protocol
- biometric data
- factor authentication
- security analysis
- security services
- key management scheme
- security requirements
- key establishment
- energy efficient
- secure communication
- sensor nodes
- secure manner
- energy consumption
- security level
- security systems
- secure routing
- public key cryptography
- lightweight
- smart card
- routing algorithm
- rights management
- private key
- sensor networks
- digital signature
- biological inspired
- encryption decryption
- electronic payment
- base station
- multi hop
- relevance feedback
- security protocols
- elliptic curve
- radio frequency
- biometric authentication
- routing protocol
- information security
- security issues
- public key
- mutual authentication
- personal identification
- key exchange protocol
- image authentication
- biometric systems
- secret key
- cryptographic protocols
- key agreement protocol
- provably secure
- diffie hellman
- secret sharing scheme
- fingerprint matching
- public key infrastructure
- trusted third party
- security properties
- fingerprint verification
- public key encryption