A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …
and are used continuously in a range of critical applications. Any damage or compromise to …
Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions
K Gafurov, TM Chung - Journal of Information Processing Systems, 2019 - koreascience.kr
Abstract Internet of Things (IoT) is the paradigm of network of Internet-connected things as
objects that constantly sense the physical world and share the data for further processing. At …
objects that constantly sense the physical world and share the data for further processing. At …
Efficient security mechanisms for mHealth applications using wireless body sensor networks
PK Sahoo - Sensors, 2012 - mdpi.com
Recent technological advances in wireless communications and physiological sensing
allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be …
allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be …
Comparative study on various authentication protocols in wireless sensor networks
SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …
and short‐ranged wireless communication. The sensors can communicate with each other …
A lightweight user authentication scheme for wireless sensor networks
O Cheikhrouhou, A Koubaa… - … on Computer Systems …, 2010 - ieeexplore.ieee.org
User authentication in classical networks is deeply addressed, but few results are related to
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …
A lightweight blockchain scheme for a secure smart dust IoT environment
J Park, KH Park - Applied Sciences, 2020 - mdpi.com
Since a smart dust Internet of Things (IoT) system includes a very large number of devices
sometimes deployed in hard-access areas, it is very difficult to prevent security attacks and …
sometimes deployed in hard-access areas, it is very difficult to prevent security attacks and …
Puf-based node mutual authentication scheme for delay tolerant mobile sensor network
K Yang, K Zheng, Y Guo, D Wei - 2011 7th International …, 2011 - ieeexplore.ieee.org
As an emerging network, Delay Tolerant Mobile Sensor Network (DTMSN) is susceptible to
be attacked because of its limited resources and intermittent connectivity. Though …
be attacked because of its limited resources and intermittent connectivity. Though …
3D from an image sequence-occlusions and perspective
User authentication in classical networks is deeply addressed, but few results are related to
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …
Wireless Sensor Networks (WSNs). In addition, the proposed schemes do not provide …
[PDF][PDF] A survey on various issues in wireless sensor networks
KH Wandra, S Pandya - Int J Sci Eng, 2012 - academia.edu
Recent developments in micro-electro-mechanical systems (MEMS), wireless
communications, and digital electronics have enabled development of low cost, low power …
communications, and digital electronics have enabled development of low cost, low power …
An Improved μTESLA Protocol Based on Queuing Theory and Benaloh‐Leichter SSS in WSNs
H Huang, T Gong, T Chen, M Xiong, X Pan… - Journal of …, 2016 - Wiley Online Library
Broadcast authentication is a fundamental security technology in wireless sensor networks
(ab. WSNs). As an authentication protocol, the most widely used in WSN, μTESLA protocol …
(ab. WSNs). As an authentication protocol, the most widely used in WSN, μTESLA protocol …