A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
AN INVESTIGATION STUDY ON ENERGY EFFICIENT AUTHENTICATION TECHNIQUES IN WIRELESS SENSOR NETWORK
2018
International Journal of Advanced Research in Computer Science
Wireless sensor networks (WSNs) are ubiquitous technology for the growth of low cost and low power wireless technology. ...
In existing authentication methods, key management schemes and hashing techniques were used for increasing the authentication and security level performance. ...
BASIS: A Practical Multi-User Broadcast Authentication Scheme for Wireless Sensor Networks WSN includes sink node, sensor node, and users. ...
doi:10.26483/ijarcs.v9i2.5893
fatcat:xbpwxfzmhng53cfcffnkznfb3e
Survey of Security Technologies on Wireless Sensor Networks
2015
Journal of Sensors
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. ...
to traditional networks, which makes wireless sensor networks face more security threats. ...
Wireless sensor networks have a very important scientific and practical value. ...
doi:10.1155/2015/842392
fatcat:mewhks7ppbetpi6fjq4huzgrt4
A Survey On Security In Wireless Sensor Network
2019
Southeast Europe Journal of Soft Computing
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). ...
In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research. ...
But their scheme is designed for only one sensor node to authenticate the user, not the whole wireless sensor networks. ...
doi:10.21533/scjournal.v8i1.174
fatcat:5qi4jzi6g5cfldjyuhyf2qku7u
LIRA: A new key deployment scheme for Wireless Body Area Networks
2013
2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)
However, there is still a need to ensure a reliable and secure communication in these systems. In this paper we present a novel multi-channel key deployment scheme for wireless body sensor networks. ...
A rapid development of the Wireless Body Area Network (WBAN) has become very important for applications in telemedicine and m-health. ...
[24] propose a new practical and interoperable key management scheme for BSN, KALwEN. ...
doi:10.1109/softcom.2013.6671884
dblp:conf/softcom/KovacevicPC13
fatcat:ejma2liev5bjvjnbzqjiy7cxta
EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
2014
American Journal of Applied Sciences
In this study, we develop a cluster based technique for key management in wireless sensor network. ...
Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. ...
INTRODUCTION
Wireless Sensor Network A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN). ...
doi:10.3844/ajassp.2014.969.977
fatcat:n7rbspv75rhmbdxj7jrrdrfobu
LTA: A Linked Timestamp based Authentication Protocol for Sensor Network
2019
International Journal of Security and Its Applications
Security in wireless communication is a major concern not only for authenticated sources but also for transfer consistent data from sender nodes to base station while maintains network obtainability. ...
Wireless Sensor Networks (WSNs) comprised of numerous spatially scattered autonomous devices that receive and transmit data using an insecure wireless channel. ...
INTRODUCTION Wireless Sensor Networks (WSNs) are a key technology in the twentieth century because of its compact size, cheap, and facility to work in remote hostile locations. ...
doi:10.33832/ijsia.2019.13.4.10
fatcat:bzxkuhz7irb4jehusdlursnev4
Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks
2015
International Journal of Computer Applications
This performance evaluation survey will evaluate these two authentication methods for various scenarios in the 4G network. ...
The 4G network are cellular network which provides higher bandwidth and fast speed but there are few security flaws and thus to protect the users privacy,a very well defined security support is mandatory ...
layer solution against selective interference in network TDMA-based sensors which does not require a central entity, sensor nodes need to rely solely on local information and allows them to join and leave ...
doi:10.5120/20884-3644
fatcat:hfhn2rs3r5bbhgqp5iwln2m7lm
ASK-BAN
2013
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13
In this paper, for the first time, we answer this open problem in the setting of Wireless Body Area Networks (BANs). ...
We propose ASK-BAN, a lightweight fast authenticated secret key extraction scheme for intra-BAN communication. Our scheme neither introduces any advanced hardware nor relies on out-of-band channels. ...
In this paper, we answer this open problem in the setting of wireless Body Area Networks (BANs) and propose a lightweight, body movement-aided authenticated secret key extraction scheme for intra-BAN communication ...
doi:10.1145/2462096.2462123
dblp:conf/wisec/ShiYYL13
fatcat:sccj3gip7zfhtfyz663ptdzhvi
IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management
2019
IEEE Access
opportunity broadcast protocol for trustworthy data dissemination in wireless sensor networks,'' by Lai and Wang. ...
In the former, the authors proposed a practical, conditional privacypreserving authentication scheme. ...
doi:10.1109/access.2019.2915489
fatcat:duhaq23h2rbejboby3hhxvnzse
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
2012
KSII Transactions on Internet and Information Systems
First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed ...
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. ...
Broadcast authentication is a critical security service in WSNs, as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. ...
doi:10.3837/tiis.2012.01.002
fatcat:ycyufngdtrdobmu33j3wqizydy
A novel authentication and access control framework in wireless sensor networks
2015
Journal of Advanced Computer Science & Technology
Wireless Sensor Networking continues to evolve as one of the most challenging research areas. ...
Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a wellimplemented security scheme is absolutely essential. ...
Identity-based Multi-user Broadcast Authentication System (IMBAS) is another broadcast authentication approach put forward by Cao et al. [4] . ...
doi:10.14419/jacst.v4i1.4307
fatcat:agd2xhqm2zgbjizfqtk23tq34e
Fast authentication in wireless sensor networks
2016
Future generations computer systems
Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs). ...
Thus, speeding up signature verification is a problem of considerable practical importance, especially in resource-constrained environments. ...
Introduction In wireless sensor networks, message broadcast is an efficient and a common communication paradigm that allows a multitude of users to join in and disseminate messages into the network dynamically ...
doi:10.1016/j.future.2014.07.006
fatcat:ybczbdfudjh7rcetqda7ch36oe
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
2011
Sensors
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). ...
In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. ...
Considering another example, an athlete is being monitored using a wireless sensor network while he/she is practicing in the club [65] . ...
doi:10.3390/s120100055
pmid:22368458
pmcid:PMC3279202
fatcat:yfaq2ilem5cm7mpacaafsjgwga
Path Mechanism to reduce packet data loss in Wireless Mesh Networks
2012
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
A wireless mesh network (WMN) is a communicationnetwork made up of radio nodes organized in a meshtopology. Wireless mesh network often consists of meshclients, mesh routers and gateways. ...
A wireless Mesh networkuses multi-hop communication. Due to multi-hop architectureand wireless nature, Mesh networks are vulnerable to varioustypes of Denial of Services attack. ...
The scheme is independent of the routing protocol or network architecture, and is suitable for multi-channel wireless mesh network [15] . M. ...
doi:10.24297/ijct.v2i3c.6779
fatcat:zhqhcb5sxbafpfl6zmlutn4yy4
Wireless Medical Sensor Data Patronage
2018
International Journal for Research in Applied Science and Engineering Technology
Nowadays, Wireless Sensor Network is used on a large scale. ...
These networks are eavesdropping, middleman attacks, impersonation, replaying attacks compared to the wired networks. Previously many trials were done in order to protect the wireless sensor network. ...
In this paper, we propose the policy in such a way the insider attacks as well. The design of the policy on the basis of the data integrity, the authentication and access.
II. ...
doi:10.22214/ijraset.2018.3372
fatcat:v7w2ahtjz5fybf7w3vtpv7v3rq
« Previous
Showing results 1 — 15 out of 2,811 results