Three-Factor User Authentication Scheme for WSN
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 1)Publication Date: 2019-01-30
Authors : Mercy Jeba Malar P; Senthil Kumar;
Page : 119-124
Keywords : authentication; key management; privacy; wireless sensor networks; security;
Abstract
Major revolution takes place in technology today is the digital technology taking over analog technology and converting it into centralized cloud and wireless systems. With the rapid advancements in wireless technology, small devices began to be utilized in almost all parts of various regions in day to day life. These small devices are equipped for sensing, computation and communication. This technological invention is widely known as Wireless Sensor Networks (WSNs). This advanced sensor technology is used in various application scenarios such as environment, agriculture and healthcare too. Wireless sensor networks (WSNs) play a vital role in Internet of Things (IoT) and different types of real time applications such as military surveillance, healthcare monitoring and manufacturing. Although the advancements in WSN, it has security threats. Authentication is the very important part in Wireless Sensor Network (WSN) only authenticated user is allowed to access the realtime sensing information. In this paper we propose an effective and secure three-factor authentication and key agreement scheme for WSN.
Other Latest Articles
- YOUTH’S ATTITUDE TOWARDS INTERNET CRIME: SOCIAL FACTORS, CAUSES AND EFFECTS
- PSEUDOACHONDROPLASIA - REHABILITATION CHALLENGES AND PREVENTION OFMISDIAGNOSIS
- Current status of tobacco in India: a preventable cause of death
- USES OF ULTRASONICS IN ENDODONTICS, A REVIEW
- LATE PRESENTATION OF IR-REDUCIBLE COMPLEX DORSAL DISLOCATION OF THE METACARPOPHALANGEAL JOINT OF THE THUMB
Last modified: 2019-02-08 22:04:22