Survey on pairing based cryptography for wireless sensor networks

K Ravi, R Khanai, K Praveen - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) are increasingly used in most of the devices in the modern
world. The nodes in the WSNs are mobile and vulnerable to attacks, so security is a major …

Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures

SD Suganthi, R Anitha, P Thanalakshmi - … of the Computer Society of India …, 2016 - Springer
A Wireless sensor network (WSN) is composed of a large number of sensor nodes, which
perform multiple tasks, namely sensing, data processing and forwarding of observed data …

A secure mutual trust scheme for wireless sensor networks

AD Yein, CH Lin, WS Hsieh - 2017 IEEE 26th International …, 2017 - ieeexplore.ieee.org
In this paper, we propose a secure mutual trust scheme based on the concept of chameleon
hash function, for wireless sensor networks (WSNs). In the proposed scheme, the base …

Ensuring Security Using Core Based Routing Algorithm In Wireless Sensor Networks

A Mubarakali, D Mavaluru - Revista Publicando, 2018 - revistapublicando.org
Wireless sensor networks (WSNs) circulate hundreds to thousands of modest miniaturized
scale sensor hubs in their locales and these hubs are vital parts of Internet of Things (IoT). In …

[引用][C] 在物聯網感測層中建立一個具有隱私. 信任. 保密的互連機制

張明皓 - 2016 - 撰者