A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks.
Sang Guun YooHyukjun LeeJuho KimPublished in: Int. J. Distributed Sens. Networks (2013)
Keyphrases
- user authentication
- scheme for wireless sensor networks
- stream cipher
- security analysis
- data aggregation
- authentication scheme
- key management
- wireless sensor networks
- secret key
- remote user authentication scheme
- authentication protocol
- information security
- image encryption
- high security
- keystroke dynamics
- biometric systems
- public key
- security requirements
- security level
- smart card
- password guessing
- information systems