Survey on user authentication protocol in wireless sensor network
In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. Howe...
Saved in:
Main Authors: | Wei-dong FANG, Wu-xiong ZHANG, Lian-hai SHAN, Wei HE, Wei CHEN |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Two-factor wearable device authentication protocol based on PUF and IPI
by: Jun WANG, et al.
Published: (2017-06-01) -
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01) -
EVALUATION OF DATA COLLECTION TREE ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
by: Do Huy Khoi
Published: (2024-12-01) -
Enhanced Beidou user equipment access authentication protocol based on location key
by: Jin CAO, et al.
Published: (2022-11-01) -
Efficient ID-based multicast authentication protocol in wireless sensor networks
by: WANG Gang1, et al.
Published: (2009-01-01)