The internet of things security: A survey encompassing unexplored areas and new insights
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …
life undertakings, mandates continuous research pursuits in IoT and its associated …
On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
KA Shim, YR Lee, CM Park - Ad Hoc Networks, 2013 - Elsevier
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
As sensor networks are more and more being implemented in real world settings, it is
necessary to analyze how the different requirements of these real-world applications can …
necessary to analyze how the different requirements of these real-world applications can …
Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks
Computing Bilinear Pairing on sensor platforms has become an important research topic
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …
SecFUN: Security framework for underwater acoustic sensor networks
In this paper we introduce SecFUN, a security framework for underwater acoustic sensor
networks (UASNs). Despite the increasing interest on UASNs, solutions to secure protocols …
networks (UASNs). Despite the increasing interest on UASNs, solutions to secure protocols …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Security in underwater sensor network
Y Cong, G Yang, Z Wei, W Zhou - … International Conference on …, 2010 - ieeexplore.ieee.org
Underwater wireless sensor network is a novel type of underwater networked system. Due to
the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious …
the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious …
End-to-end authentication in under-water sensor networks
Under-Water Wireless Sensor Networks (UWSNs) are a particular class of Wireless Sensor
Networks (WSNs) in which sensors are located, as the name suggests, underwater …
Networks (WSNs) in which sensors are located, as the name suggests, underwater …