DocumentCode :
3104274
Title :
A survey on two-factor user authentication schemes in Wireless Sensor Networks
Author :
Kaur, Sharanjeet ; Khandnor, P.
Author_Institution :
PEC Univ. of Technol., Chandigarh, India
fYear :
2015
fDate :
12-13 June 2015
Firstpage :
1077
Lastpage :
1081
Abstract :
Wireless Sensor Networks have emerged as one of the most promising technologies and promoted research avenues due to their widespread applicability. Wireless Sensor Networks have found applications in critical information infrastructure like military surveillance, nuclear power plants, etc., hence there arises the need to restrict access to critical information of such systems. So as to maintain confidentiality, user authentication is required so that only legitimate users are allowed to retrieve the information. Several two-factor user authentication schemes have been suggested by the research community. In this paper, a brief review of various security issues, security attacks and authentication schemes pertaining to Wireless Sensor Networks has been presented.
Keywords :
authorisation; information retrieval; telecommunication security; wireless sensor networks; information retrieval; security attack; two-factor user authentication scheme; wireless sensor network; Authentication; Resilience; Servers; Smart cards; Wireless communication; Wireless sensor networks; Base station (BS); Gateway node(GWN); Sensor node; Wireless Sensor Network (WSN);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference (IACC), 2015 IEEE International
Conference_Location :
Banglore
Print_ISBN :
978-1-4799-8046-8
Type :
conf
DOI :
10.1109/IADCC.2015.7154870
Filename :
7154870
Link To Document :
بازگشت