Authors
Binod Vaidya, Dimitrios Makrakis, Hussein T Mouftah
Publication date
2010/10/11
Conference
2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
Pages
600-606
Publisher
IEEE
Description
Wireless sensor networks (WSNs) are considered due to the ubiquitous nature, ease of deployment, and wide range of possible applications. WSNs can be deployed in unattended environments, where a registered user can login to the network and access data collected by the linked sensors. Authenticating users in resource constrained environments is one of the major security concerns. Since sensor nodes have limited resources and computation power, it is desirable that the authentication protocol is simple and efficient. In 2009, M. L. Das proposed a two-factor authentication for WSNs, where a user has to prove possession of both, a password and a smart card. Since his scheme utilizes only cryptographic one-way hash function and exclusive-OR operation, it is well-suited for resource constrained environments. However, Khan and Algahathbar pointed out that Das's scheme has some flaws and is vulnerable …
Total citations
2011201220132014201520162017201820192020202120222023202424719132024151316171294
Scholar articles
B Vaidya, D Makrakis, HT Mouftah - 2010 IEEE 6th International Conference on Wireless …, 2010