Title :
Two-factor user authentication in wireless sensor networks
Author_Institution :
Dhirubhai Ambani Inst. of Inf. & Commun. Technol., Gandhinagar
fDate :
3/1/2009 12:00:00 AM
Abstract :
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Keywords :
cryptographic protocols; internetworking; message authentication; wireless sensor networks; hash function; resource-constrained environment; sensor/gateway node; session key establishment; two-factor user authentication protocol; wireless sensor network; Access protocols; Authentication; Communication system security; Cryptography; Environmental economics; Monitoring; Power generation economics; Safety devices; Telecommunication traffic; Wireless sensor networks; Authentication; hash function; sensor networks; wireless security;
Journal_Title :
Wireless Communications, IEEE Transactions on
DOI :
10.1109/TWC.2008.080128