Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

 
Paperback

ECC based Authentication Scheme for Wireless Sensor Networks

$303.99
Sign in or become a Readings Member to add this title to your wishlist.

This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). This protocol allows for the revocation of smart cards and prevents cloning attacks.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
LAP Lambert Academic Publishing
Date
16 February 2024
Pages
216
ISBN
9786207463954

This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). This protocol allows for the revocation of smart cards and prevents cloning attacks.

Read More
Format
Paperback
Publisher
LAP Lambert Academic Publishing
Date
16 February 2024
Pages
216
ISBN
9786207463954