Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wireless transmission medium and by the limited hardware and software capabilities of the nodes in such networks. We analyze the requirements for using RF fingerprints to initialize secure authenticated links in a wireless sensor network for a surveillance application that allows older people to remain in their homes longer (termed the 'Aging in Place' application). We survey the applicable research for RF fingerprints and other security-related and authentication-related work. We show that RF fingerprints alone are inadequate for authentication. We present a new authentication protocol based on digital credentials that binds together physical-...
Wireless sensor networks can be used to measure and monitor many challenging problems and typically ...
A wireless sensor network(WSN) consisiting of a large number of tiny sensors can be an effective too...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
RF Fingerprints can be used to distinguish between distinct transmitter signals in a Wireless Sensor...
We demonstrate empirically a physical layer authentication method that uses the physical attributes ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
We demonstrate the feasibility of fingerprinting the radio of wireless sensor nodes (Chipcon 1000 ra...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
Authentication, confidentiality, integrity and non-repudiation are the key factors of security. They...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Wireless sensor networks can be used to measure and monitor many challenging problems and typically ...
A wireless sensor network(WSN) consisiting of a large number of tiny sensors can be an effective too...
Wireless sensor networks are widely used in industrial process control, human health care, environme...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
RF Fingerprints can be used to distinguish between distinct transmitter signals in a Wireless Sensor...
We demonstrate empirically a physical layer authentication method that uses the physical attributes ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
We demonstrate the feasibility of fingerprinting the radio of wireless sensor nodes (Chipcon 1000 ra...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
Authentication, confidentiality, integrity and non-repudiation are the key factors of security. They...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Wireless sensor networks can be used to measure and monitor many challenging problems and typically ...
A wireless sensor network(WSN) consisiting of a large number of tiny sensors can be an effective too...
Wireless sensor networks are widely used in industrial process control, human health care, environme...