A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …

Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions

K Gafurov, TM Chung - Journal of Information Processing Systems, 2019 - koreascience.kr
Abstract Internet of Things (IoT) is the paradigm of network of Internet-connected things as
objects that constantly sense the physical world and share the data for further processing. At …

Efficient security mechanisms for mHealth applications using wireless body sensor networks

PK Sahoo - Sensors, 2012 - mdpi.com
Recent technological advances in wireless communications and physiological sensing
allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be …

Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

A lightweight user authentication scheme for wireless sensor networks

O Cheikhrouhou, A Koubaa… - … on Computer Systems …, 2010 - ieeexplore.ieee.org
User authentication in classical networks is deeply addressed, but few results are related to
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …

A lightweight blockchain scheme for a secure smart dust IoT environment

J Park, KH Park - Applied Sciences, 2020 - mdpi.com
Since a smart dust Internet of Things (IoT) system includes a very large number of devices
sometimes deployed in hard-access areas, it is very difficult to prevent security attacks and …

Puf-based node mutual authentication scheme for delay tolerant mobile sensor network

K Yang, K Zheng, Y Guo, D Wei - 2011 7th International …, 2011 - ieeexplore.ieee.org
As an emerging network, Delay Tolerant Mobile Sensor Network (DTMSN) is susceptible to
be attacked because of its limited resources and intermittent connectivity. Though …

3D from an image sequence-occlusions and perspective

A Shmuel, M Werman - … . 1991 IEEE Computer Society Conference on …, 1991 - computer.org
User authentication in classical networks is deeply addressed, but few results are related to
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …

[PDF][PDF] A survey on various issues in wireless sensor networks

KH Wandra, S Pandya - Int J Sci Eng, 2012 - academia.edu
Recent developments in micro-electro-mechanical systems (MEMS), wireless
communications, and digital electronics have enabled development of low cost, low power …

An Improved μTESLA Protocol Based on Queuing Theory and Benaloh‐Leichter SSS in WSNs

H Huang, T Gong, T Chen, M Xiong, X Pan… - Journal of …, 2016 - Wiley Online Library
Broadcast authentication is a fundamental security technology in wireless sensor networks
(ab. WSNs). As an authentication protocol, the most widely used in WSN, μTESLA protocol …