Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.

Ding Wang,Ping Wang
DOI: https://doi.org/10.1016/j.adhoc.2014.03.003
IF: 4.816
2014-01-01
Ad Hoc Networks
Abstract:•We show various security flaws in two password authentication schemes for HWSN.•We put forward three general principles to explicate repeated security failures.•Public-key techniques are indispensible to achieve truly two-factor security.•We take the first step toward investigating into the rationales of design choices.
What problem does this paper attempt to address?