4.7 Article

Two-Factor User Authentication in Wireless Sensor Networks

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 8, Issue 3, Pages 1086-1090

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2008.080128

Keywords

Authentication; sensor networks; wireless security; hash function

Ask authors/readers for more resources

Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available