A novel asymmetric three-party based authentication scheme in wearable devices environment
S Liu, S Hu, J Weng, S Zhu, Z Chen - Journal of Network and Computer …, 2016 - Elsevier
As we know, wearable devices record data generating from user׳ s daily activities, and most
of which are private data, such as health data and movement data. These information is …
of which are private data, such as health data and movement data. These information is …
Securing wireless sensors in military applications through resilient authentication mechanism
Using wireless sensor nodes in military operations reduces risks and improves the efficiency
of operations, and above all, it minimizes causalities by a large number. Security of sensor …
of operations, and above all, it minimizes causalities by a large number. Security of sensor …
A dynamic key management scheme for dynamic wireless sensor networks
Dynamic wireless sensor network (DWSN) is a group of mobile sensor nodes deployed in
an intended area. Secure communication in DWSNs depends on the existence of an …
an intended area. Secure communication in DWSNs depends on the existence of an …
Evaluation of secure multi-hop node authentication and key establishment mechanisms for wireless sensor networks
I Mansour, G Chalhoub, P Lafourcade - Journal of sensor and actuator …, 2014 - mdpi.com
Designing secure authentication mechanisms in wireless sensor networks in order to
associate a node to a secure network is not an easy task due to the limitations of this type of …
associate a node to a secure network is not an easy task due to the limitations of this type of …
Multihop node authentication mechanisms for wireless sensor networks
I Mansour, D Rusinek, G Chalhoub… - Ad-hoc, Mobile, and …, 2014 - Springer
Designing secure authentication mechanisms in wireless sensor networks in order to
associate a node to a secure network is not an easy task due to the limitations of this type of …
associate a node to a secure network is not an easy task due to the limitations of this type of …
Authentication in flat Wireless Sensor Networks with mobile nodes
M Saleh, N El-Meniawy… - 2015 IEEE 12th …, 2015 - ieeexplore.ieee.org
Secure communication inWireless Sensor Networks (WSNs) requires the verification of the
identities of network nodes. This is to prevent a malicious intruder from injecting false data …
identities of network nodes. This is to prevent a malicious intruder from injecting false data …
[PDF][PDF] The Impact of Mobility Models on the Performance of Authentication Services in Wireless Sensor Networks
ABSTRACT The applications of Wireless Sensor Networks (WSNs) are very important
nowadays and could be found in many different life aspects. Broadcast authentication (BA) …
nowadays and could be found in many different life aspects. Broadcast authentication (BA) …
Light weight authentication and key establishment protocol for underwater acoustic sensor networks
M Park, Y Kim, O Yi - The Journal of Korean Institute of …, 2014 - koreascience.kr
Abstract Underwater Acoustic Sensor Networks (UASN) enables varied study from collected
data of underwater environments such as pollution monitoring, disaster prevention. The …
data of underwater environments such as pollution monitoring, disaster prevention. The …
Routing-guided authentication in wireless sensor networks
M Saleh, N El-Meniawy… - 2015 IEEE Tenth …, 2015 - ieeexplore.ieee.org
Entity authentication is a crucial security objective since it enables network nodes to verify
the identity of each other. Wireless Sensor Networks (WSNs) are composed of a large …
the identity of each other. Wireless Sensor Networks (WSNs) are composed of a large …
Multipath Selection Method for En-route Filtering in Dynamic Wireless Sensor Network
KA Kim, TH Cho - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Wireless sensor networks are supplied with limited energy resource, deployed in hostile
environments, and use wireless communication. Thus, sensor nodes are prone to failure …
environments, and use wireless communication. Thus, sensor nodes are prone to failure …