Cryptanalysis and improvement of an authentication protocol for wireless sensor networks.
NeerulDevender KumarPublished in: Trans. Emerg. Telecommun. Technol. (2023)
Keyphrases
- authentication protocol
- wireless sensor networks
- secret key
- hash functions
- lightweight
- smart card
- key management
- sensor networks
- public key
- security analysis
- rfid tags
- security protocols
- energy consumption
- database systems
- sensor nodes
- routing protocol
- key distribution
- resource constrained
- encryption scheme
- cost effective
- intrusion detection
- rfid systems