Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks

[1]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[2]  Maurizio Rebaudengo,et al.  A Key Management Scheme for Mobile Wireless Sensor Networks , 2017 .

[3]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[4]  Guilin Wang,et al.  An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[5]  Ayaz Hassan Moon,et al.  Implementation of Node Authentication for WSN Using Hash Chains , 2016 .

[6]  Raja Iqbal,et al.  SCUR: Secure Communications in Wireless Sensor Networks using Rabbit , 2008 .

[7]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[8]  Jyh-Ming Huang,et al.  An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks , 2013 .

[9]  Dheerendra Mishra,et al.  Construction of lightweight authentication scheme for network applicants using smart cards , 2020 .

[10]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[11]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[12]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[13]  Reza Fotohi,et al.  Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..

[14]  Henry Nunoo-Mensah,et al.  Tamper-aware authentication framework for wireless sensor networks , 2017, IET Wirel. Sens. Syst..

[15]  Hani Alzaid,et al.  MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches. , 2008, 2008 New Technologies, Mobility and Security.

[16]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[17]  Muzzammil Hussain,et al.  Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks , 2015 .

[18]  Muzzammil Hussain,et al.  Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[19]  Mawloud Omar,et al.  Efficient and energy-aware key management framework for dynamic sensor networks , 2018, Comput. Electr. Eng..

[20]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[21]  S. Raja Rajeswari,et al.  Comparative Study on Various Authentication Protocols in Wireless Sensor Networks , 2016, TheScientificWorldJournal.

[22]  Kwangjo Kim,et al.  Untraceable Mobile Node Authentication in WSN , 2010, Sensors.

[23]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[24]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[25]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[26]  JooSeok Song,et al.  Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks , 2019, EURASIP J. Wirel. Commun. Netw..

[27]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[28]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[29]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[30]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[31]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[32]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[33]  Ismail Mansour,et al.  Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.