Comparative study on various authentication protocols in wireless sensor networks
SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …
and short‐ranged wireless communication. The sensors can communicate with each other …
A review on lightweight node authentication algorithms in wireless sensor networks
Wireless sensor nodes are prone to several critical attacks due to the distributed placement
of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN …
of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN …
Light-SAE: a lightweight authentication protocol for large-scale IoT environments made with constrained devices
Due to the increasing demand for Internet of Things (IoT) applications with sensitive data,
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …
A sustainable solution to support data security in high bandwidth healthcare remote locations by using TCP CUBIC mechanism
M Ahmad, S Jabbar, A Ahmad… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Long distance high bandwidth networks are spanning several continents and many remote
Healthcare centers are centralizing their data centers for economic reasons. For the best …
Healthcare centers are centralizing their data centers for economic reasons. For the best …
Hrts: A hierarchical reactive time synchronization protocol for wireless sensor networks
Time synchronization plays an important role in the performance of wireless sensor
networks. It can enhance the throughput and the lifetime of the network by improving the …
networks. It can enhance the throughput and the lifetime of the network by improving the …
Enhancing privacy for ad hoc systems with predeployment key distribution
M Klonowski, P Syga - Ad Hoc Networks, 2017 - Elsevier
Achieving security in distributed systems of constrained devices (like Wireless Sensor
Networks) requires methods that can be performed while very limited computational …
Networks) requires methods that can be performed while very limited computational …
Efficient security mechanism to counter the malicious attack in wireless sensor networks
Security in wireless sensor network (WSN) is a critical issue when it comes to malicious
attack or power loss. Recently, several security mechanisms have been proposed. In this …
attack or power loss. Recently, several security mechanisms have been proposed. In this …
Lightweight cryptography for IoT devices
PMC Rosa - 2022 - repositorio.ul.pt
Lightweight cryptography is a field that has been growing fast recently due to the demand for
secure Internet of Things (IoT) applications. These algorithms provide se curity for …
secure Internet of Things (IoT) applications. These algorithms provide se curity for …
[PDF][PDF] Security of Mobile Ad Hoc and Wireless Sensor Networks
E Bonver - 2013 - wiki.owasp.org
OWASP Plan - Strawman Page 1 Copyright © The OWASP Foundation Permission is granted to
copy, distribute and/or modify this document under the terms of the OWASP License. The …
copy, distribute and/or modify this document under the terms of the OWASP License. The …