Oct 26, 2015 · Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking.
This paper presents a lightweight mutual authentication protocol for WSN applications that, for the purpose of data protection but with a low computational ...
We have proposed a new authentication protocol for vehicular system in WSN to tackle the problem of vehicles running on road such as avoidance of traffic jams.
This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats.
Secure Key Management and Mutual Authentication Protocol for Wireless ...
link.springer.com › article
Apr 10, 2023 · This paper proposes a Hybrid Key Management Scheme for WSNs linking edge devices which use Elliptic Curve Cryptography (ECC) and a hash function to generate ...
Nov 14, 2023 · This work proposes a lightweight and secure authentication protocol for the IoT devices in WSN. A PUF and its machine learning (ML)–based soft ...
This paper presents a low-cost authentication protocol for IoT edge devices that exploits power-up states of built-in SRAM for device fingerprint generations.
Jan 13, 2016 · This section briefly discusses some of the popular authentication protocol schemes in wireless sensor networks.
Therefore, anonymous authentication schemes with perfect forward secrecy for WSNs should be designed by using only the lightweight cryptographic primitives, ...
Oct 26, 2024 · This article presents two novel methods for 2FA that use encryption techniques, scramble architecture, and chord architecture.