2011 International Conference on Emerging Trends in Electrical and Computer Technology 2011
DOI: 10.1109/icetect.2011.5760267
|View full text |Cite
|
Sign up to set email alerts
|

Improved user authentication in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…rough the request-response handshake mechanism to ensure the two-way authentication between the user and the gateway node, this solution avoids the problem of asynchrony between the smart card and the gateway node. e literature [13] presents a two-factor authentication protocol that provides a powerful authentication and session key establishment process.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…rough the request-response handshake mechanism to ensure the two-way authentication between the user and the gateway node, this solution avoids the problem of asynchrony between the smart card and the gateway node. e literature [13] presents a two-factor authentication protocol that provides a powerful authentication and session key establishment process.…”
Section: Related Workmentioning
confidence: 99%
“…Description Application [10,11] Security mechanisms For wireless sensor networks [12] A lightweight smart card-based authentication scheme For wireless sensor networks [13] A two-factor authentication protocol For wireless sensor networks [14] Uses ID technology and elliptic curve cryptosystem For resource-constrained wireless sensor networks [15] Protects the data security For the perception layer [16,17] Key agreement protocols For lightweight IoT environment [18] An improved key agreement protocol For heterogeneous sensor network [19] Uses chaotic mapping For IIoT environment [20] Combines data encryption with game theory For privacy protection in IIoT [21] Uses stake blockchain For dynamic wireless sensor networks In the same way, A can pretend to be P 2 . First, A chooses r 2 ′ ∈ Z * q , then computes ψ 2 ′ � r 2 ′ P 0 + r 2 ′ q 2 P and σ 2 ′ � r 2 ′ P 0 , finally sends the tuple ψ 2 ′ , σ 2 ′ to the initiator.…”
Section: Literature Studiesmentioning
confidence: 99%
“…Besides, as a physical device for information protection techniques, the use of smart cards is rapidly increasing in various application domains such as financial transaction, entrance control and health care management [1,2,4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Arikumar, Thirumoorthy [12] proposed an ''Improved User Authentication in Wireless Sensor Networks''. The basic idea of the protocol is that a user will receive a personalized smart card from the GW-node at the time of the registration process and then with the help of user's password and smart card the user can login to the sensor/ GW node and access data from the network.…”
Section: Related Workmentioning
confidence: 99%
“…al. [3] Das [13] H e [ 16] Algahathour [17] Huang [14] Vaidya [15] Arikuma [12] Yeh [18] Sun et al [5] Our security framework can effectively defend against the Sybil attack, the node replication attack, and the wormhole attack by including the security time stamp in our protocol, a new node is only allowed to join the sensor network during its time stamp length. After that it becomes an old node.…”
Section: Communication Costmentioning
confidence: 99%