Abstract

There have been discussed many user authentication schemes for wireless sensor networks. This paper intends to review the existing authentication techniques for their pros and cons. The techniques are primarily classified on the basis of factors used therein that include one-factor, two-factor, and three-factor schemes. Twelve architecture models on which various authentication schemes are based. The pros and cons of models are also discussed. The security and functionality feature is also used as criteria for evaluation metrics. In this paper, we have also considered various one-factor, two-factor and three-factor authentication scheme. The communication, computation cost, security feature and the security tool are the most important criteria for comparing the authentication techniques. This whole analysis can be used by other researchers to design their own authentication schemes considering the stated criteria.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call