[PDF][PDF] An enhanced two-factor user authentication scheme in wireless sensor networks.

D He, Y Gao, S Chan, C Chen, J Bu - Ad Hoc Sens. Wirel. Networks, 2010 - academia.edu
Designing a user authentication protocol for wireless sensor networks is a difficult task
because wireless networks are susceptible to attacks and sensor node has limited energy …

A security-performance-balanced user authentication scheme for wireless sensor networks

SG Yoo, KY Park, J Kim - International journal of distributed …, 2012 - journals.sagepub.com
The uses of wireless sensor networks have increased to be applicable in many different
areas, such as military applications, ecology, and health applications. These applications …

Improved two-factor user authentication in wireless sensor networks

B Vaidya, D Makrakis… - 2010 IEEE 6th International …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are considered due to the ubiquitous nature, ease of
deployment, and wide range of possible applications. WSNs can be deployed in unattended …

Two‐factor mutual authentication with key agreement in wireless sensor networks

B Vaidya, D Makrakis, H Mouftah - Security and …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended
environments, where a registered user can log in to the network and access data collected …

Two-factor user authentication in wireless sensor networks

ML Das - IEEE transactions on wireless communications, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSN) are typically deployed in an unattended environment,
where the legitimate users can login to the network and access data as and when …

Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks

P Kumar, HJ Lee - 2011 Wireless Advanced, 2011 - ieeexplore.ieee.org
In 2009, ML Das has proposed a two-factor user authentication scheme for wireless sensor
networks, where each user proves his/her legitimacy using password and smart card. Later …

Enhancement of two-factor user authentication in wireless sensor networks

HF Huang, YF Chang, CH Liu - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
Wireless sensor networks are widely used for applications such as environmental
monitoring, airport safety, health care, etc. For user authentication, in 2009, Das proposed a …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

An improved dynamic user authentication scheme for wireless sensor networks

HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …

Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'

MK Khan, K Alghathbar - Sensors, 2010 - mdpi.com
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since sensor nodes are equipped with …