Security enhanced user authentication scheme for wireless sensor network.
Hoda JannatiAbolfazl FalahatiPublished in: Int. J. Electron. Secur. Digit. Forensics (2012)
Keyphrases
- authentication scheme
- user authentication
- wireless sensor networks
- key management
- elliptic curve cryptography
- security flaws
- security analysis
- authentication protocol
- image encryption
- image authentication
- secret key
- information security
- smart card
- network security
- security policies
- biometric systems
- public key
- access control
- mutual authentication
- high dimensional
- key agreement
- real time