4,636 Hits in 5.3 sec

Security and resilience for smart devices and applications

Damien Sauveron, Konstantinos Markantonakis, Christos Verikoukis
2014 EURASIP Journal on Wireless Communications and Networking  
There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective  ...  Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices.  ...  However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their  ... 
doi:10.1186/1687-1499-2014-123 fatcat:ljmyjdcaezf7ngavdybaz3ftbm

A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks

M. B. Apsara, P. Dayananda, C. N. Sowmyarani
2020 Zenodo  
Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research.  ...  Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical  ...  For such networks authentication and key agreement are important.  ... 
doi:10.5281/zenodo.3659495 fatcat:cs6im6tqsjaepgo4lndbxpqh3q

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

Mostafa farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amirhossein Mohajerzadeh
2020 IEEE Access  
INDEX TERMS Authentication, wireless sensor networks, key agreement, ECDH, security, privacy.  ...  Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman).  ...  [28] used three-factor user authentication technique to proposed an efficient multi-gateway and key agreement protocol for hierarchical wireless sensor networks.  ... 
doi:10.1109/access.2020.2987764 fatcat:q7nj5bw2pbgg3o6j4i6uqooll4

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments

Yuting Li, Qingfeng Cheng, Wenbo Shi
2021 Security and Communication Networks  
Recently, a lightweight identity-based authenticated key agreement protocol for Industrial Internet of Things, called ID-2PAKA protocol, was claimed to achieve secure authentication and meet security properties  ...  The identity-based authenticated key agreement protocol can solve these security threats to a certain extent.  ...  wireless sensor networks [12] A lightweight smart card-based authentication scheme For wireless sensor networks [13] A two-factor authentication protocol For wireless sensor networks [14] Uses ID  ... 
doi:10.1155/2021/5573886 doaj:748c4991957047c7a952c19f413bf19a fatcat:qyzsmhlwhnbvrahbamkrcnlpju

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks

Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen
2013 International Journal of Distributed Sensor Networks  
's published protocol, W. Shi and P. Gong proposes a new authentication protocol for wireless sensor networks using elliptic curves cryptography.  ...  Irum et al. presents a hybrid key agreement scheme for wireless body area networks (WBANs) for both intra-WBAN and inter-WBAN communications.  ... 
doi:10.1155/2013/956736 fatcat:ezkxiaxal5bnniidgemvfkm72y

Research Trends and Challenges for Network-Based ICT Systems

Homero Toral-Cruz, Albena D. Mihovska, Miroslav Voznak, Kamaljit I. Lakhtaria, Robert Bestak
2015 Wireless personal communications  
Welcome to this special issue of Wireless Personal Communications on Research Trends and Challenges for Network-based ICT Systems.  ...  This special issue provide an in-depth research study of the latest trends and challenges for network-based ICT systems.  ...  [13] analyzes the security and design flaws of a recently proposed dynamic ID authentication and key agreement scheme by Lin.  ... 
doi:10.1007/s11277-015-2724-4 fatcat:vfhi666j2vbdljt5ajoocqe2mu

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che
2015 Journal of Sensors  
to traditional networks, which makes wireless sensor networks face more security threats.  ...  This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages  ...  [11] proposed an efficient extensible authentication protocol to ensure that there is at least one probability of a shared key between two nodes and update the authentication key based on dynamically  ... 
doi:10.1155/2015/842392 fatcat:mewhks7ppbetpi6fjq4huzgrt4

Establishment of Secure Communication in Wireless Sensor Networks

T P Rani
2012 Computer Science & Engineering An International Journal  
Finally, we aim to provide the different techniques of efficient key management operations for secure communications in WSN.  ...  Wireless sensor networks (WSNs) consists of small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications.  ...  In this paper, efficient cryptographic techniques have been proposed which ensures confidentiality, authenticity, availability and integrity of wireless sensor network that are deployed in hostile environment  ... 
doi:10.5121/cseij.2012.2204 fatcat:r3r7khre4zdfhluvr2gerfaddm

Sensor Authentication in Dynamic Wireless Sensor Network Environments

Kyusuk Han, Taeshik Shon
2012 International Journal of RFID Security and Cryptography  
In the dynamic sensor network, mobile sensor nodes will continuously move around and frequently reconnect to other sensor nodes.  ...  For th based key agreement, Zhu et al. [5] showed the efficient key distribution model with clu enables the less overhead of the base station.  ...  Authenticated Key Agreement Protocols for Static Sensor Networks Most previous key agreement protocols were based on the symmetric key cryptosystem.  ... 
doi:10.20533/ijrfidsc.2046.3715.2012.0005 fatcat:eebbvoqsbna4vlwztqz64agzgm

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

S. Raja Rajeswari, V. Seenivasagam
2016 The Scientific World Journal  
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network.  ...  Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications  ...  Various Authentication Protocols in Wireless Sensor Networks This section briefly discusses some of the popular authentication protocol schemes in wireless sensor networks.  ... 
doi:10.1155/2016/6854303 pmid:26881272 pmcid:PMC4737465 fatcat:chiprus46fh4bio4oeqynfxkam

A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks

Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs).  ...  It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining.  ...  A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks G. Vijaya Shanthi, K.V.N.  ... 
doi:10.35940/ijitee.i7205.079920 fatcat:ze7gjtaj4jgs5blai3zyozidqe

Key Management for Wireless Sensor Network Security

Gaith A. Muslim, Ra'ad A. Muhajjar
2022 International Journal of Computer Applications  
The information is critical so securing it is property cannot be dispensed in wireless sensor networks. In this paper, security schemes have been proposed for securing hierarchical WSNs.  ...  Most applications use wireless sensor networks (WSNs) to collect data, which are considered low-cost solutions to a variety of real-world problems.  ...  In the case of network dynamics, dynamic KM, network heterogeneity, and mobility, it is noticed that important agreement design criteria such as scalability, resistance, revocation, and resiliency requires  ... 
doi:10.5120/ijca2022921985 fatcat:uy2aueyicbdklpe5r7bccigdh4

A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding
2016 Journal of Sensors  
For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection.  ...  Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.  ...  In this paper, a lightweight authentication and key management protocol AKMS has been proposed for wireless sensor networks.  ... 
doi:10.1155/2016/1547963 fatcat:5b5q2vk2kjf5pldrz6ybvgxgje

Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication

Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng, Jeong-Uk Kim
2013 International Journal of Security and Its Applications  
In this paper, a lightweight authentication model for wireless sensor networks composed of a key management and an authentication protocol is presented.  ...  The literature [8] proposes a suitable negotiating session key agreement for WSN node.  ...  Acknowledgments We would like to express our gratitude to our University and college for supporting our work. This work was funded in part by  ... 
doi:10.14257/ijsia.2013.7.5.21 fatcat:uvb6wn4emrdzpmmuknl6eeldou

ECIES for Group Key Establishment in WSN for Secure Multicast Communication

Miss.P.Prasanna Laxmi, Mrs. M. Anupama
2017 International Journal Of Engineering And Computer Science  
A wireless sensor network (WSN) as the name suggest is a wireless network with spatially distributed autonomous devices making use of sensors for monitoring physical or environmental conditions.  ...  Two group key protocols are developed for secure multicast communications among the resource-constrained devices.  ...  Energy conservation in wireless sensor networks has been the primary objective, but however, this constrain is not the only consideration for efficient working of wireless sensor networks.  ... 
doi:10.18535/ijecs/v6i4.10 fatcat:sh2bgteofbbprielkxkwvplbwy
« Previous Showing results 1 — 15 out of 4,636 results