Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

KA Shim, YR Lee, CM Park - Ad Hoc Networks, 2013 - Elsevier
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …

An authentication framework for wireless sensor networks using identity-based signatures

R Yasmin, E Ritter, G Wang - 2010 10th IEEE International …, 2010 - ieeexplore.ieee.org
In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to
avoid attacks against secure communication, and to mitigate DoS attacks exploiting the …

A survey of broadcast authentication schemes for wireless networks

K Grover, A Lim - Ad Hoc Networks, 2015 - Elsevier
With the increase in the usage of wireless networks and their applications where broadcast
transmission is widely used, it has become critical to authenticate broadcast messages …

Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments

F Afianti, T Suryani - IEEE Access, 2019 - ieeexplore.ieee.org
Using a smart grid, which increases efficiency and makes it easier to monitor critical
equipment in a power grid. Online real-time applications equipped with a wireless sensor …

Accelerating signature-based broadcast authentication for wireless sensor networks

X Fan, G Gong - Ad Hoc Networks, 2012 - Elsevier
In wireless sensor networks (WSNs), broadcast authentication is a crucial security
mechanism that allows a multitude of legitimate users to join in and disseminate messages …

On security of wireless sensor networks: a data authentication protocol using digital signature

HW Ferng, NM Khoa - Wireless Networks, 2017 - Springer
Guaranteeing end-to-end data security in wireless sensor networks (WSNs) is important and
has drawn much attention of researchers over past years. Because an attacker may take …

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks

S Ubaid, MF Shafeeq, M Hussain, AH Akbar… - The Journal of …, 2018 - Springer
In modern epoch of cyber warfare and their countermeasures, wireless sensor networks
(WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs …

On handling insider attacks in wireless sensor networks

C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …

An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation

R Yasmin, E Ritter, G Wang - IEICE TRANSACTIONS on …, 2012 - search.ieice.org
In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to
avoid attacks against secure communication, and to mitigate against DoS attacks exploiting …