Publication: Two-factor user authentication in wireless sensor networks
dc.contributor.affiliation | DA-IICT, Gandhinagar | |
dc.contributor.author | Das, Manik Lal | |
dc.contributor.author | Das, Maniklal | |
dc.date.accessioned | 2025-08-01T13:09:05Z | |
dc.date.issued | 01-03-2009 | |
dc.description.abstract | Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency. | |
dc.format.extent | 1086-1090 | |
dc.identifier.citation | Das, Manik Lal. "Two-factor user authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 08, no. 03, pp. 1086-1090, Mar. 2009. | |
dc.identifier.doi | 10.1109/TWC.2008.080128 | |
dc.identifier.issn | 1536-1276 | |
dc.identifier.scopus | 2-s2.0-62949130774 | |
dc.identifier.uri | https://ir.daiict.ac.in/handle/dau.ir/1615 | |
dc.identifier.wos | WOS:000264293200006 | |
dc.language.iso | en | |
dc.publisher | IEEE | |
dc.relation.ispartofseries | Vol. 8; No. 3 | |
dc.source | IEEE Transactions on Wireless Communications | |
dc.source.uri | https://ieeexplore.ieee.org/document/4801450 | |
dc.title | Two-factor user authentication in wireless sensor networks | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | b5cc5527-f42b-4c08-bdc3-50c4d46603a0 | |
relation.isAuthorOfPublication.latestForDiscovery | b5cc5527-f42b-4c08-bdc3-50c4d46603a0 |