Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
暂无分享,去创建一个
Saleem Iqbal | Kashif Naseer Qureshi | Faisal Bashir | Najam Ul Islam | Rosheen Qazi | Arsalan Arshad | K. Qureshi | Saleem Iqbal | M. Najam-ul-Islam | F. Bashir | Rosheen Qazi | Arsalan Arshad
[1] A. Senthilkumar,et al. Cryptography based secure multipath routing protocols in wireless sensor network: A survey , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[2] Athanasios V. Vasilakos,et al. On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC , 2018, Int. J. Commun. Syst..
[3] Halil Yetgin,et al. A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks , 2017, IEEE Communications Surveys & Tutorials.
[4] Rohit Vaid,et al. Analysis of Existing Protocols in WSN Based on Key Parameters , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.
[5] V. Nandalal,et al. An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN) , 2020 .
[6] Nadra Guizani,et al. Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.
[7] Halizah Basiron,et al. A Review on Security Challenges and Features in Wireless Sensor Networks: IoT Perspective , 2018 .
[8] Abdul Hanan Abdullah,et al. Adaptation of wireless sensor network in industries and their architecture, standards and applications , 2014 .
[9] Saru Kumari,et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks , 2017, Journal of Ambient Intelligence and Humanized Computing.
[10] Hwajeong Seo. Compact Software Implementation of Public-Key Cryptography on MSP430X , 2018, TECS.
[11] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[12] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[13] Satish Chand,et al. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2019, J. Ambient Intell. Humaniz. Comput..
[14] Abdul Hanan Abdullah,et al. Channel quality and utilization metric for interference estimation in Wireless Mesh Networks , 2017, Comput. Electr. Eng..
[15] Wei-hong Wang,et al. Design and implementation of an ECDSA-based identity authentication protocol on WSN , 2009, 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.
[16] Muli Ben-Yehuda,et al. Ginseng: market-driven memory allocation , 2014, VEE '14.
[17] Roger Wattenhofer,et al. YETI: an Eclipse plug-in for TinyOS 2.1 , 2009, SenSys '09.
[18] Imran Ghani,et al. An algorithm for detecting SQL injection vulnerability using black-box testing , 2020, J. Ambient Intell. Humaniz. Comput..
[19] Monali V. Rajput,et al. Security Challenges in Wireless Sensor Networks , 2017 .
[20] Jing Li,et al. A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing , 2019, IEEE Access.
[21] Amine Kardi,et al. Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks , 2018, 2018 21st Saudi Computer Society National Computer Conference (NCC).
[22] Xiong Li,et al. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems , 2020, IEEE Systems Journal.
[23] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[24] Junyu Lai,et al. A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs , 2019, ACM Trans. Sens. Networks.
[25] Debiao He,et al. New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment , 2018, Secur. Commun. Networks.
[26] Nistala V. E. S. Murthy,et al. Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks , 2018, Int. J. Commun. Syst..
[27] Ali Kadhum Idrees,et al. Secret key generation in wireless sensor network using public key encryption , 2019, ICICT '19.
[28] Philip Levis,et al. The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.
[29] Tong Li,et al. Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT , 2018, Wirel. Commun. Mob. Comput..
[30] Kashif Naseer Qureshi,et al. Link quality and energy utilization based preferable next hop selection routing for wireless body area networks , 2020, Comput. Commun..
[31] Jan Willemson,et al. Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[32] B. Karthikeyan,et al. Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES] , 2018 .
[33] Abdul Hanan Abdullah,et al. Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks , 2018, Int. J. Commun. Syst..
[34] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[35] Qing Chang,et al. A node authentication protocol based on ECC in WSN , 2010, 2010 International Conference On Computer Design and Applications.
[36] A. Pravin Renold,et al. An enhanced elliptic curve algorithm for secured data transmission in wireless sensor network , 2015, 2015 Global Conference on Communication Technologies (GCCT).
[37] Song Ju,et al. A lightweight key establishment in wireless sensor network based on elliptic curve cryptography , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.
[38] Abdul Hanan Abdullah,et al. Provision of Security in Vehicular Ad Hoc Networks through an Intelligent Secure Routing Scheme , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).
[39] Seog Chung Seo,et al. A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks , 2006, EUC Workshops.
[40] Hong Xu,et al. A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography , 2018, Sensors.
[41] Anthony T. Chronopoulos,et al. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs) , 2018 .
[42] Kai Xu,et al. A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..
[43] Abdul Hanan Abdullah,et al. Soft-GORA: Soft Constrained Globally Optimal Resource Allocation for Critical Links in IoT Backhaul Communication , 2018, IEEE Access.
[44] Seungjo Bae,et al. Design of Network Management Platform and Security Framework for WSN , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[45] Parli B. Hari,et al. Security issues in Wireless Sensor Networks: Current research and challenges , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[46] Hesham Arafat,et al. Security and Key Management Challenges Over WSN (a Survey) , 2019 .
[47] Rawya Y. Rizk,et al. A new security protocol using hybrid cryptography algorithms , 2013, 2013 9th International Computer Engineering Conference (ICENCO).
[48] Mohammad S. Obaidat,et al. A robust mutual authentication protocol for WSN with multiple base-stations , 2018, Ad Hoc Networks.