A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
An Efficient Authentication Scheme Based on deployment knowledge against Mobile Sink Replication Attack in Unattended Wireless Sensor Networks
2019
IEEE Internet of Things Journal
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual
doi:10.1109/jiot.2019.2930823
fatcat:ewro3njuufb33gc7yep5sf7o3q