Abstract
PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.
Reference25 articles.
1. Selecting key management schemes for WSN applications;Computers & Security,2012
2. When ‘friends’ collide: social heterogeneity and user vulnerability on social network sites;Computers in Human Behavior,2016
3. Camtepe, S.A. and Yener, B. (2005), Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Technical Report, Rensselaer Polytechnic Institute, Troy, New York, pp. 5-7.
4. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks;Journal of Network and Computer Applications,2011
5. Wireless protocol validation under uncertainty,2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献