ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Three-Factor User Authentication Scheme for WSN

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 1)

Publication Date:

Authors : ; ;

Page : 119-124

Keywords : authentication; key management; privacy; wireless sensor networks; security;

Source : Downloadexternal Find it from : Google Scholarexternal


Major revolution takes place in technology today is the digital technology taking over analog technology and converting it into centralized cloud and wireless systems. With the rapid advancements in wireless technology, small devices began to be utilized in almost all parts of various regions in day to day life. These small devices are equipped for sensing, computation and communication. This technological invention is widely known as Wireless Sensor Networks (WSNs). This advanced sensor technology is used in various application scenarios such as environment, agriculture and healthcare too. Wireless sensor networks (WSNs) play a vital role in Internet of Things (IoT) and different types of real time applications such as military surveillance, healthcare monitoring and manufacturing. Although the advancements in WSN, it has security threats. Authentication is the very important part in Wireless Sensor Network (WSN) only authenticated user is allowed to access the realtime sensing information. In this paper we propose an effective and secure three-factor authentication and key agreement scheme for WSN.

Last modified: 2019-02-08 22:04:22