[IEEE 2009 3rd IEEE International Sympos
โ
Wang, Wei-hong; Cui, Yi-ling; Chen, Tie-ming
๐
Article
๐
2009
๐
IEEE
โ 97 KB
As the first step of the key management, identity authentication directly affects the security of WSN. However because of the limited-resources of WSN, traditional authentication protocol can't directly apply in WSN. To adapt to needs of it, we propose an ID-based identity authentication protocol ba