An enhanced two-factor user Authentication Scheme in Wireless Sensor Networks

ISSN: 15519899
255Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

Designing a user authentication protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and sensor node has limited energy, processing and storage resources. Recently, several authentication schemes have been proposed. This short paper shows some security problems and design weaknesses in those schemes. Furthermore, an enhanced two-factor user authentication protocol is presented. The proposed scheme only uses hash function, and a successful user authentication just requires three message exchanges. Security and performance analyses demonstrate that compared to the well-known authentication schemes, our proposal is more secure and efficient. © 2010 Old City Publishing, Inc.

Cite

CITATION STYLE

APA

He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user Authentication Scheme in Wireless Sensor Networks. Ad-Hoc and Sensor Wireless Networks, 10(4), 361–371.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free