Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"
DOI: 10.1109/tsmc.2019.2957175
Abstract: Until now, the pseudonym ID and one-time hash chain as the key technologies solve anonymous and forward secrecy properties, respectively, in lightweight authentication protocols for wireless sensor networks (WSNs) environment. However, both techniques have to…
read more here.
Keywords:
authentication scheme;
lightweight authentication;
authentication;
sensor networks ... See more keywords