Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Research challenges in wireless networks of biomedical sensors
Implanted biomedical devices have the potential to revolutionize medicine. Smart sensors,
which are created by combining sensing materials with integrated circuitry, are being …
which are created by combining sensing materials with integrated circuitry, are being …
Deep photo style transfer
This paper introduces a deep-learning approach to photographic style transfer that handles
a large variety of image content while faithfully transferring the reference style. Our approach …
a large variety of image content while faithfully transferring the reference style. Our approach …
Cyber security in the smart grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
A survey on the communication architectures in smart grid
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …
promising solution for energy crisis. One important feature of the smart grid is the integration …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …
SPINS: Security protocols for sensor networks
As sensor networks edge closer towards wide-spread deployment, security issues become a
central concern. So far, much research has focused on making sensor networks feasible and …
central concern. So far, much research has focused on making sensor networks feasible and …
Ariadne: A secure on-demand routing protocol for ad hoc networks
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li - ACM Transactions on Information and System …, 2005 - dl.acm.org
Pairwise key establishment is a fundamental security service in sensor networks; it enables
sensor nodes to communicate securely with each other using cryptographic techniques …
sensor nodes to communicate securely with each other using cryptographic techniques …
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003 - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …