Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Research challenges in wireless networks of biomedical sensors

L Schwiebert, SKS Gupta, J Weinmann - Proceedings of the 7th annual …, 2001 - dl.acm.org
Implanted biomedical devices have the potential to revolutionize medicine. Smart sensors,
which are created by combining sensing materials with integrated circuitry, are being …

Deep photo style transfer

F Luan, S Paris, E Shechtman… - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
This paper introduces a deep-learning approach to photographic style transfer that handles
a large variety of image content while faithfully transferring the reference style. Our approach …

Cyber security in the smart grid: Survey and challenges

W Wang, Z Lu - Computer networks, 2013 - Elsevier
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …

A survey on the communication architectures in smart grid

W Wang, Y Xu, M Khanna - Computer networks, 2011 - Elsevier
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

SPINS: Security protocols for sensor networks

A Perrig, R Szewczyk, V Wen, D Culler… - Proceedings of the 7th …, 2001 - dl.acm.org
As sensor networks edge closer towards wide-spread deployment, security issues become a
central concern. So far, much research has focused on making sensor networks feasible and …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Establishing pairwise keys in distributed sensor networks

D Liu, P Ning, R Li - ACM Transactions on Information and System …, 2005 - dl.acm.org
Pairwise key establishment is a fundamental security service in sensor networks; it enables
sensor nodes to communicate securely with each other using cryptographic techniques …

TESLA broadcast authentication

A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003 - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …