A novel asymmetric three-party based authentication scheme in wearable devices environment

S Liu, S Hu, J Weng, S Zhu, Z Chen - Journal of Network and Computer …, 2016 - Elsevier
As we know, wearable devices record data generating from user׳ s daily activities, and most
of which are private data, such as health data and movement data. These information is …

Securing wireless sensors in military applications through resilient authentication mechanism

U Jain, M Hussain - Procedia Computer Science, 2020 - Elsevier
Using wireless sensor nodes in military operations reduces risks and improves the efficiency
of operations, and above all, it minimizes causalities by a large number. Security of sensor …

A dynamic key management scheme for dynamic wireless sensor networks

SH Erfani, HHS Javadi… - Security and …, 2015 - Wiley Online Library
Dynamic wireless sensor network (DWSN) is a group of mobile sensor nodes deployed in
an intended area. Secure communication in DWSNs depends on the existence of an …

Evaluation of secure multi-hop node authentication and key establishment mechanisms for wireless sensor networks

I Mansour, G Chalhoub, P Lafourcade - Journal of sensor and actuator …, 2014 - mdpi.com
Designing secure authentication mechanisms in wireless sensor networks in order to
associate a node to a secure network is not an easy task due to the limitations of this type of …

Multihop node authentication mechanisms for wireless sensor networks

I Mansour, D Rusinek, G Chalhoub… - Ad-hoc, Mobile, and …, 2014 - Springer
Designing secure authentication mechanisms in wireless sensor networks in order to
associate a node to a secure network is not an easy task due to the limitations of this type of …

Authentication in flat Wireless Sensor Networks with mobile nodes

M Saleh, N El-Meniawy… - 2015 IEEE 12th …, 2015 - ieeexplore.ieee.org
Secure communication inWireless Sensor Networks (WSNs) requires the verification of the
identities of network nodes. This is to prevent a malicious intruder from injecting false data …

[PDF][PDF] The Impact of Mobility Models on the Performance of Authentication Services in Wireless Sensor Networks

I Almomani, K Sundus - Jordanian Journal of Computers …, 2020 - pdfs.semanticscholar.org
ABSTRACT The applications of Wireless Sensor Networks (WSNs) are very important
nowadays and could be found in many different life aspects. Broadcast authentication (BA) …

Light weight authentication and key establishment protocol for underwater acoustic sensor networks

M Park, Y Kim, O Yi - The Journal of Korean Institute of …, 2014 - koreascience.kr
Abstract Underwater Acoustic Sensor Networks (UASN) enables varied study from collected
data of underwater environments such as pollution monitoring, disaster prevention. The …

Routing-guided authentication in wireless sensor networks

M Saleh, N El-Meniawy… - 2015 IEEE Tenth …, 2015 - ieeexplore.ieee.org
Entity authentication is a crucial security objective since it enables network nodes to verify
the identity of each other. Wireless Sensor Networks (WSNs) are composed of a large …

Multipath Selection Method for En-route Filtering in Dynamic Wireless Sensor Network

KA Kim, TH Cho - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Wireless sensor networks are supplied with limited energy resource, deployed in hostile
environments, and use wireless communication. Thus, sensor nodes are prone to failure …