IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06)
DOI: 10.1109/sutc.2006.1636182
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic User Authentication Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
226
0
1

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 250 publications
(227 citation statements)
references
References 7 publications
0
226
0
1
Order By: Relevance
“…If ( ' , ) > , then the password is not correct, so the system terminates the session; otherwise, the smart card computes 1 = ⊕ ' , which is equal to h( || ), 2 = h( ‖ ), where is a random number generated by the user , is the current timestamp of 's system, and…”
Section: )mentioning
confidence: 99%
“…If ( ' , ) > , then the password is not correct, so the system terminates the session; otherwise, the smart card computes 1 = ⊕ ' , which is equal to h( || ), 2 = h( ‖ ), where is a random number generated by the user , is the current timestamp of 's system, and…”
Section: )mentioning
confidence: 99%
“…Wong et al [10] proposed an efficient user authentication scheme. It is based on user's password and uses cryptographic hash function.…”
Section: Related Workmentioning
confidence: 99%
“…Tseng et al [14] proposed a user authentication scheme which is an improved version of Wong et al [10] scheme. It is resistance to reply attack and forgery attack and also allows user to change his/her password freely.…”
Section: Related Workmentioning
confidence: 99%
“…In [4] authors propose a dynamic user authentication scheme for WSNs. In the proposed scheme authorized users can access any of the sensor nodes in WSNs using mobile devices, such as PDAs, PCs, etc.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme of [5] presents a modification to Wong et al's scheme [4], that not only fixes the weaknesses but also enhances the security of it. The proposed scheme is resilient against replay and forgery attacks, and it reduces the risk of password leakage from the sensor nodes.…”
Section: Related Workmentioning
confidence: 99%