Scalable and Low Overhead Watermarking Based Integrated Authentication and Encryption Scheme for Wireless Sensor Networks

...................................................................................... iii Table of contents............................................................................ iv List of figures................................................................................ vi List of tables.................................................................................. viii Chapter

[1]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[2]  Qiang Liu,et al.  High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion , 2015, IET Comput. Digit. Tech..

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  Cheng-Chi Lee,et al.  A Secure and Efficient One-time Password Authentication Scheme for WSN , 2017, Int. J. Netw. Secur..

[5]  Özgür B. Akan,et al.  Spectrum-aware and cognitive sensor networks for smart grid applications , 2012, IEEE Communications Magazine.

[6]  Marco Zennaro,et al.  On Real-Time Performance Evaluation of Volcano-Monitoring Systems With Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[7]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[9]  Habib Youssef,et al.  Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.

[10]  Kamarulzaman Ab. Aziz,et al.  Managing disaster with wireless sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[11]  Liu Yong-Min,et al.  The Architecture and Characteristics of Wireless Sensor Network , 2009, 2009 International Conference on Computer Technology and Development.

[12]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[13]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.

[14]  Yuguang Fang,et al.  Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[15]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[16]  Michalis Faloutsos,et al.  Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[17]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[19]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[20]  Sipra Das Bit,et al.  LoWaNA: low overhead watermark based node authentication in WSN , 2016, Wirel. Networks.

[21]  C. Chellappan,et al.  The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .

[22]  Vijay Varadharajan,et al.  A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks , 2010, MobiQuitous.

[23]  Erik Persson Energy Harvesting in Wireless Sensor Networks , 2019 .

[24]  Judy E. O'Neill,et al.  The role of ARPA in the development of the ARPANET, 1961-1972 , 1995, IEEE Ann. Hist. Comput..

[25]  Wendi B. Heinzelman,et al.  Water Quality Monitoring Using Wireless Sensor Networks , 2017 .

[26]  Ping Wang,et al.  On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.

[27]  Ting-Lan Lin,et al.  VLSI Implementation of a Cost-Efficient Micro Control Unit With an Asymmetric Encryption for Wireless Body Sensor Networks , 2017, IEEE Access.

[28]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[29]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[30]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[31]  Kamlesh Gupta,et al.  Security issues in wireless sensor networks , 2010 .

[32]  Ebrahim A. Alrashed,et al.  A Key Management Approach for Forward and Backward Secrecy in Unattended WSNs , 2017 .

[33]  M. J. O'Driscoll,et al.  Cooperative Engagement Capability , 1997 .

[34]  Cheng-Chi Lee,et al.  An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.

[35]  Jing Xu,et al.  An efficient location-based compromise-tolerant key management scheme for sensor networks , 2011, Inf. Process. Lett..

[36]  Roberto Di Pietro,et al.  Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[37]  Harsh K. Verma,et al.  Authentication Protocol for Wireless Sensor Networks , 2010 .

[38]  Jianfeng Ma,et al.  An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..

[39]  Xiaodong Wang,et al.  Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.

[40]  Ajay Shekhar Pandey,et al.  Key management in efficient and secure group communication , 2016, 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES).

[41]  Alexandre Yakovlev,et al.  Efficient advanced encryption standard implementation using lookup and normal basis , 2009, IET Comput. Digit. Tech..

[42]  Srikanta P. Kumar,et al.  SensIT: Sensor Information Technology For the Warfighter , 2001 .