Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps.
Devender KumarSatish ChandBijendra KumarPublished in: IET Networks (2020)
Keyphrases
- user authentication
- image encryption
- authentication scheme
- scheme for wireless sensor networks
- chaotic maps
- secret key
- stream cipher
- key management
- security analysis
- data aggregation
- wireless sensor networks
- image encryption algorithm
- encryption algorithm
- authentication protocol
- smart card
- information security
- hash functions
- chaotic sequence
- pseudorandom
- biometric systems
- encryption scheme
- low cost