Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …

LEAP+ Efficient security mechanisms for large-scale distributed sensor networks

S Zhu, S Setia, S Jajodia - ACM Transactions on Sensor Networks …, 2006 - dl.acm.org
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management
protocol for sensor networks that is designed to support in-network processing, while at the …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks

A Liu, P Ning - … Conference on Information Processing in Sensor …, 2008 - ieeexplore.ieee.org
Public key cryptography (PKC) has been the enabling technology underlying many security
services and protocols in traditional networks such as the Internet. In the context of wireless …

A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet

A Nourian, S Madnick - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Cyber physical systems (CPSs) are increasingly being adopted in a wide range of industries
such as smart power grids. Even though the rapid proliferation of CPSs brings huge benefits …

A survey on wireless sensor network security

J Sen - arxiv preprint arxiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

Security in wireless sensor networks

X Du, HH Chen - IEEE Wireless Communications, 2008 - ieeexplore.ieee.org
Recent advances in electronics and wireless communication technologies have enabled the
development of large-scale wireless sensor networks that consist of many low-power, low …

Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

Multicast authentication in the smart grid with one-time signature

Q Li, G Cao - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
Multicast has been envisioned to be useful in many smart grid applications such as demand-
response, wide area protection, in-substation protection and various operation and control …

Multi-user broadcast authentication in wireless sensor networks

K Ren, S Yu, W Lou, Y Zhang - IEEE Transactions on Vehicular …, 2009 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …