An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - mdpi.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks

J Jung, J Moon, D Lee, D Won - Sensors, 2017 - mdpi.com
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor
Network (WSN) to securely obtain desired information, and numerous studies have …

A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …

An enhanced user authentication and key agreement scheme for wireless sensor networks tailored for IoT

P Tyagi, S Kumari, BA Alzahrani, A Gupta, MH Yang - Sensors, 2022 - mdpi.com
A security protocol for wireless transmission is essential to defend sensitive information from
malicious enemies by providing a variety of facilities such as privacy of the user's …

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

S Kumari, AK Das, M Wazid, X Li, F Wu… - Concurrency and …, 2017 - Wiley Online Library
A wireless sensor network (WSN) typically consists of a large number of resource‐
constrained sensor nodes and several control or gateway nodes. Ensuring the security of …

A strong authentication scheme with user privacy for wireless sensor networks

P Kumar, A Gurtov, M Ylianttila, SG Lee, HJ Lee - ETRI journal, 2013 - Wiley Online Library
Wireless sensor networks (WSNs) are used for many real‐time applications. User
authentication is an important security service for WSNs to ensure only legitimate users can …

An efficient anonymous user authentication and key agreement protocol for wireless sensor networks

D Kumar, HS Grover, D Kaur, A Verma… - International Journal …, 2021 - Wiley Online Library
Due to fast development of wireless technology, wireless sensor networks (WSNs) are used
in many applications such environmental monitoring, health monitoring, and area …

A biometrics‐based anonymous authentication and key agreement scheme for wireless sensor networks

Q Fan, J Chen, F Xu, L Li, M Luo - … and Computation: Practice …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) are widespreadly applicable for information acquisition
and processing in various fields such as military, healthcare, envrionment monitoring, and …

Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation

J Nam, KKR Choo, S Han, M Kim, J Paik, D Won - Plos one, 2015 - journals.plos.org
A smart-card-based user authentication scheme for wireless sensor networks (hereafter
referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both …

A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques

L Chen, F Wei, C Ma - International Journal of Distributed …, 2015 - journals.sagepub.com
User authentication in wireless sensor networks (WSNs) is a critical security issue due to
their unattended and hostile deployment in the field. In order to protect the security of real …