Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks.
Cheng-Chi LeeChun-Ta LiShun-der ChenPublished in: Parallel Process. Lett. (2011)
Keyphrases
- user authentication
- wireless sensor networks
- remote user authentication scheme
- password guessing
- authentication scheme
- smart card
- energy consumption
- security analysis
- keystroke dynamics
- authentication protocol
- biometric authentication
- biometric systems
- sensor networks
- routing algorithm
- malicious nodes
- sensor nodes
- security mechanisms
- resource constrained
- information security
- key management
- lightweight