Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks
暂无分享,去创建一个
[1] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[2] Maurizio Rebaudengo,et al. A Key Management Scheme for Mobile Wireless Sensor Networks , 2017 .
[3] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[4] Guilin Wang,et al. An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[5] Ayaz Hassan Moon,et al. Implementation of Node Authentication for WSN Using Hash Chains , 2016 .
[6] Raja Iqbal,et al. SCUR: Secure Communications in Wireless Sensor Networks using Rabbit , 2008 .
[7] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[8] Jyh-Ming Huang,et al. An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks , 2013 .
[9] Dheerendra Mishra,et al. Construction of lightweight authentication scheme for network applicants using smart cards , 2020 .
[10] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[11] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[12] Hari Om,et al. Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.
[13] Reza Fotohi,et al. Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..
[14] Henry Nunoo-Mensah,et al. Tamper-aware authentication framework for wireless sensor networks , 2017, IET Wirel. Sens. Syst..
[15] Hani Alzaid,et al. MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches. , 2008, 2008 New Technologies, Mobility and Security.
[16] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[17] Muzzammil Hussain,et al. Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks , 2015 .
[18] Muzzammil Hussain,et al. Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[19] Mawloud Omar,et al. Efficient and energy-aware key management framework for dynamic sensor networks , 2018, Comput. Electr. Eng..
[20] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[21] S. Raja Rajeswari,et al. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks , 2016, TheScientificWorldJournal.
[22] Kwangjo Kim,et al. Untraceable Mobile Node Authentication in WSN , 2010, Sensors.
[23] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[24] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[25] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[26] JooSeok Song,et al. Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks , 2019, EURASIP J. Wirel. Commun. Netw..
[27] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[28] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[29] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[30] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[31] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[32] Xiaotie Deng,et al. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[33] Ismail Mansour,et al. Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.