Comparative study on various authentication protocols in wireless sensor networks
SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …
and short‐ranged wireless communication. The sensors can communicate with each other …
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
KA Shim, YR Lee, CM Park - Ad Hoc Networks, 2013 - Elsevier
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
An authentication framework for wireless sensor networks using identity-based signatures
In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to
avoid attacks against secure communication, and to mitigate DoS attacks exploiting the …
avoid attacks against secure communication, and to mitigate DoS attacks exploiting the …
A survey of broadcast authentication schemes for wireless networks
K Grover, A Lim - Ad Hoc Networks, 2015 - Elsevier
With the increase in the usage of wireless networks and their applications where broadcast
transmission is widely used, it has become critical to authenticate broadcast messages …
transmission is widely used, it has become critical to authenticate broadcast messages …
Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments
Using a smart grid, which increases efficiency and makes it easier to monitor critical
equipment in a power grid. Online real-time applications equipped with a wireless sensor …
equipment in a power grid. Online real-time applications equipped with a wireless sensor …
Accelerating signature-based broadcast authentication for wireless sensor networks
In wireless sensor networks (WSNs), broadcast authentication is a crucial security
mechanism that allows a multitude of legitimate users to join in and disseminate messages …
mechanism that allows a multitude of legitimate users to join in and disseminate messages …
On security of wireless sensor networks: a data authentication protocol using digital signature
HW Ferng, NM Khoa - Wireless Networks, 2017 - Springer
Guaranteeing end-to-end data security in wireless sensor networks (WSNs) is important and
has drawn much attention of researchers over past years. Because an attacker may take …
has drawn much attention of researchers over past years. Because an attacker may take …
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks
In modern epoch of cyber warfare and their countermeasures, wireless sensor networks
(WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs …
(WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs …
On handling insider attacks in wireless sensor networks
C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …
challenging security problems are insider attacks. In this article we present security …
An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation
In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to
avoid attacks against secure communication, and to mitigate against DoS attacks exploiting …
avoid attacks against secure communication, and to mitigate against DoS attacks exploiting …