Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …
various events in the surrounding environment and report back to the base station. Sensor …
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT)
applications should be integrated into the Internet. According to the distributed architecture …
applications should be integrated into the Internet. According to the distributed architecture …
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …
range of industries such as agriculture and military. However, designing a secure and …
A two-factor security authentication scheme for wireless sensor networks in IoT environments
B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
As an important part of the Internet of Things, wireless sensor networks have been widely
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
[HTML][HTML] An authentication protocol for future sensor networks
M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
Enhanced authentication and key management scheme for securing data transmission in the internet of things
Abstract The Internet of Things (IoT), with its smartness and intelligence, is gradually
changing human life by allowing everyday objects to be connected to the Internet. With the …
changing human life by allowing everyday objects to be connected to the Internet. With the …
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
In current times, multimedia application includes integrated sensors, mobile networks and
Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much …
Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much …
A three-factor-based authentication scheme of 5G wireless sensor networks for IoT system
Internet of Things (IoT) is an expanding technology that facilitate physical devices to
interconnect each other over a public channel. Moreover, the security of the next-generation …
interconnect each other over a public channel. Moreover, the security of the next-generation …
A review on security challenges and features in wireless sensor networks: IoT perspective
MA Burhanuddin, AAJ Mohammed… - Journal of …, 2018 - jtec.utem.edu.my
Abstract The Internet of Things is becoming a very promising paradigm with the extensive
market adoption of the development of associated technologies, such as; cloud computing …
market adoption of the development of associated technologies, such as; cloud computing …
A robust and energy efficient authentication protocol for industrial internet of things
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …
相关搜索
- wireless sensor networks
- authentication protocol sensor networks
- enhanced authentication internet of things
- management scheme internet of things
- iot perspective security challenges
- iot networks agreement scheme
- iot deployment efficient authentication
- establishment scheme iot applications
- security authentication scheme
- authentication protocol symmetric key
- authentication protocol iot applications
- authentication protocol multimedia communications
- authentication protocol establishment scheme
- management scheme enhanced authentication
- iot deployment agreement scheme