Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

A review on lightweight node authentication algorithms in wireless sensor networks

V Mohindru, Y Singh, R Bhatt - 2018 Fifth International …, 2018 - ieeexplore.ieee.org
Wireless sensor nodes are prone to several critical attacks due to the distributed placement
of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN …

Light-SAE: a lightweight authentication protocol for large-scale IoT environments made with constrained devices

P Rosa, A Souto, J Cecílio - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
Due to the increasing demand for Internet of Things (IoT) applications with sensitive data,
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …

A sustainable solution to support data security in high bandwidth healthcare remote locations by using TCP CUBIC mechanism

M Ahmad, S Jabbar, A Ahmad… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Long distance high bandwidth networks are spanning several continents and many remote
Healthcare centers are centralizing their data centers for economic reasons. For the best …

Hrts: A hierarchical reactive time synchronization protocol for wireless sensor networks

SP Ardakani, J Padget, MD Vos - Ad Hoc Networks: 5th International ICST …, 2014 - Springer
Time synchronization plays an important role in the performance of wireless sensor
networks. It can enhance the throughput and the lifetime of the network by improving the …

Enhancing privacy for ad hoc systems with predeployment key distribution

M Klonowski, P Syga - Ad Hoc Networks, 2017 - Elsevier
Achieving security in distributed systems of constrained devices (like Wireless Sensor
Networks) requires methods that can be performed while very limited computational …

Efficient security mechanism to counter the malicious attack in wireless sensor networks

S Gupta, HK Verma, AL Sangal - CSI transactions on ICT, 2014 - Springer
Security in wireless sensor network (WSN) is a critical issue when it comes to malicious
attack or power loss. Recently, several security mechanisms have been proposed. In this …

Lightweight cryptography for IoT devices

PMC Rosa - 2022 - repositorio.ul.pt
Lightweight cryptography is a field that has been growing fast recently due to the demand for
secure Internet of Things (IoT) applications. These algorithms provide se curity for …

[PDF][PDF] Security of Mobile Ad Hoc and Wireless Sensor Networks

E Bonver - 2013 - wiki.owasp.org
OWASP Plan - Strawman Page 1 Copyright © The OWASP Foundation Permission is granted to
copy, distribute and/or modify this document under the terms of the OWASP License. The …

[引用][C] 动态分簇的异构传感器网络安全路由协议

邓亚平, 杨佳, 胡亚明 - 重庆邮电大学学报: 自然科学版, 2011