On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang,Ping Wang
DOI: https://doi.org/10.1016/j.comnet.2014.07.010
IF: 5.493
2014-01-01
Computer Networks
Abstract:•We demonstrate privacy breaches into two password authentication schemes for WSNs.•Public-key techniques are indispensible to achieve user untraceability.•Our principle is applicable to two-factor authentication for universal environments.•We discuss the viable solutions to practical realization of user anonymity.•Experimental timings of related public-key operations on small devices are reported.
What problem does this paper attempt to address?