Chrome Extension
WeChat Mini Program
Use on ChatGLM

Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network

Wireless Personal Communications(2020)

Cited 12|Views5
No score
Abstract
There have been discussed many user authentication schemes for wireless sensor networks. This paper intends to review the existing authentication techniques for their pros and cons. The techniques are primarily classified on the basis of factors used therein that include one-factor, two-factor, and three-factor schemes. Twelve architecture models on which various authentication schemes are based. The pros and cons of models are also discussed. The security and functionality feature is also used as criteria for evaluation metrics. In this paper, we have also considered various one-factor, two-factor and three-factor authentication scheme. The communication, computation cost, security feature and the security tool are the most important criteria for comparing the authentication techniques. This whole analysis can be used by other researchers to design their own authentication schemes considering the stated criteria.
More
Translated text
Key words
WSNs,Authentication scheme,Security,Attacks,One-factor,Two-factor,Three-factor
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined