Login / Signup
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ding Wang
Ping Wang
Published in:
Ad Hoc Networks (2014)
Keyphrases
</>
factor authentication
wireless sensor networks
real time
key management scheme
wireless sensor
key management
sensor networks
low cost
security requirements
trusted computing
security issues
resource constrained
security mechanisms
authentication systems
energy consumption
information security