A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC
2013
International Journal of Computer Applications
In this paper,animproved user authentication protocol based on Elliptic Curve Cryptography (ECC) has been introduced for hierarchical wireless sensor networks (HWSN). ...
User authentication in case of wireless sensor network is a very critical task, as sensor nodes are deployed in unattached environment and are prone to possible hostile network attacks. ...
Here a smart-card based user authentication scheme in hierarchical wireless sensor network using ECC is proposed. ...
doi:10.5120/11528-7352
fatcat:ezkg6wqx6zhmrayxsp54em6tte
Security Flaws of a Password Authentication Scheme for Hierarchical WSNs
2013
Journal of Advances in Computer Networks
Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs). ...
They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.' ...
Very recently, Das et al. proposed a dynamic password-based user authentication scheme with smart cards for hierarchical wireless sensor networks [18] . ...
doi:10.7763/jacn.2013.v1.25
fatcat:yc4ufj5bnfhklezozuelkos5pu
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
2016
International Journal of Network Security
In 2012, Das et al. proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks and showed that their scheme is secure against all possible attacks. ...
To overcome these drawbacks, we have proposed an efficient and robust user authentication scheme for hierarchical wireless sensor networks without tamper-proof smart card in this paper. ...
[4] proposed a dynamic passwordbased user authentication scheme for hierarchical wireless sensor networks. ...
dblp:journals/ijnsec/MaitraAGS16
fatcat:3crrxxjfsbarhii5cpgampc7k4
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
2013
Elektronika ir Elektrotechnika
Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks, which provides high security and a simple authentication approach. ...
Index Terms-Password-based, user authentication, smart card, wireless sensor networks. ...
s scheme we propose an improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. ...
doi:10.5755/j01.eee.19.6.2038
fatcat:csfvmo5gkffzpoufzkdiuw2k64
Improved User Authentication in Hierarchical Wireless Sensor Networks
2023
Journal of Software Assessment and Valuation
Wireless sensor networks (WSNs) serve various real-time applications, such as vehicular tracking and habitat monitoring. ...
Given the resource limitations of sensor nodes, simple and energy-efficient user authentication is crucial. ...
In this section, we describe the hierarchical wireless sensor network and our proposed user authentication scheme with cluster formation in more detail. ...
doi:10.29056/jsav.2023.12.14
fatcat:7dlgtrpa2fdshcj6mokaq5toty
Secure Multimodal Authentication Scheme for Wireless Sensor Networks
2021
International Journal of Safety and Security Engineering
In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS) is proposed to authenticate legitimate users. ...
There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs. ...
A novel user authentication method using biometric was proposed for wireless sensor networks. ...
doi:10.18280/ijsse.110605
fatcat:haobpcieang2thsk2ncrq2suxa
Enhanced User Authentication Scheme for Wireless Sensor Networks
2015
International Journal of Security and Its Applications
To provide unlinkability for wireless sensor network, Jiang et al. proposed an efficient two factor user authentication scheme. The scheme provides some good aspects for wireless sensor network. ...
Then, this paper proposes a new enhanced user authentication scheme over wireless sensor networks to solve the weaknesses in Jiang et al.'s scheme. ...
The proposed user authentication scheme could be used as a security building block for the wireless sensor network security. ...
doi:10.14257/ijsia.2015.9.8.32
fatcat:kxzdptreundcbh525s4zuupupq
A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). ...
It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. ...
The resiliency of the security protocols under a dynamic environment is not assured. The author in [12] explored the lightweight security mechanisms for the industrial wireless sensor networks. ...
doi:10.35940/ijitee.i7205.079920
fatcat:ze7gjtaj4jgs5blai3zyozidqe
A Survey Of Access Control Schemes In Wireless Sensor Networks
2011
Zenodo
Using the node density parameter, we also provide a comparison of these proposed access control algorithms based on the network topology which can be flat or hierarchical. ...
Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent malicious nodes from joining the sensor network, access control is required. ...
[40] proposed a lightweight dynamic user authentication scheme for WSNs. ...
doi:10.5281/zenodo.1330653
fatcat:fvqi3njsi5fztdjeqo6ywnrsi4
An efficient authentication and key agreement scheme based on ECDH for wireless sensor network
2020
IEEE Access
INDEX TERMS Authentication, wireless sensor networks, key agreement, ECDH, security, privacy. ...
Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important ...
In 2012 to provide this feature a password-based user authentication scheme in hierarchical WSN proposed by Das et al. [23] . Next year, Xue et al. ...
doi:10.1109/access.2020.2987764
fatcat:q7nj5bw2pbgg3o6j4i6uqooll4
Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme
2014
International Journal of Computer Applications
available in the network as well as provide user anonymity. ...
Various security attacks may cause unauthorized access, misuse, modification, or denial of a computer network and network accessible resources. ...
In Maharana and Khilar's scheme [31] , a smart card based user authentication scheme based on elliptic curve cryptography for large scale hierarchical wireless sensor networks is presented. ...
doi:10.5120/17709-8718
fatcat:oeucoi5glzamhgnj3y7jbugytm
A novel and efficient user access control scheme for wireless body area sensor networks
2014
Journal of King Saud University: Computer and Information Sciences
This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. ...
Wireless body area networks (WBANs) can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. ...
Our contributions This paper proposes a new password and group-based user access control scheme in wireless body area networks for health care applications. ...
doi:10.1016/j.jksuci.2013.10.007
fatcat:ssj2mdcfcbb4xk3mji72qlgogu
A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks
[article]
2023
arXiv
pre-print
This paper proposes a User-Based authentication scheme to mitigate DoS attacks in WBSNs. ...
A five-phase User-Based authentication DoS mitigation scheme for WBSNs is designed by integrating Elliptic Curve Cryptography (ECC) with Rivest Cipher 4 (RC4) to ensure a strong authentication process ...
ACKNOWLEDGMENT The authors would like to thank the Tshwane University of Technology for financial support. ...
arXiv:2303.14441v1
fatcat:se3kcut3tbhevgxqzziet5527u
A Unique Secure Multimodal Biometrics-Based User Authenticated Key Exchange Protocol for generic HIoT Networks
2020
International Journal of Emerging Trends in Engineering Research
Multimodal Biometrics-based User Authenticated Key Exchange Protocol (SMBUAKEP). ...
The Special sort of generic IoT network namely Hierarchical IoT Network (HIoTN) is one in which a client can legitimately get to the continuous information from the sensing nodes in a protected generic ...
Figure 1 : 1 Figure 1 : Architecture Diagram for Secure Multimodal Biometrics-Based User Authenticated Key Exchange Protocol for generic HIoT networks
Figure 2 : 2 Figure 2 : A hierarchical IoT-based ...
doi:10.30534/ijeter/2020/22852020
fatcat:ywpytzppzvcirb7qdx6iooxqju
Survey of Security Technologies on Wireless Sensor Networks
2015
Journal of Sensors
to traditional networks, which makes wireless sensor networks face more security threats. ...
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. ...
[21] proposed based on ECC encryption secure user authentication protocols. In 2012, Peng [22] proposed a multiidentity-based authentication scheme and Hong et al. ...
doi:10.1155/2015/842392
fatcat:mewhks7ppbetpi6fjq4huzgrt4
« Previous
Showing results 1 — 15 out of 1,252 results