Integration between wireless sensor networks and traditional IP networks using the IPv6 and 6LoWPAN standards is a very active research and application area. A combination of hybrid network significantly increases the complexity of addressing connectivity and fault tolerance problems in a highly heterogeneous environment, including for example different packet sizes in different networks. In such challenging conditions, securing the communication between nodes with very diverse computational, memory and energy storage resources is at the same time an essential requirement and a very complex issue. In this paper we present an efficient and secure mutual authentication and key establishment protocol based on Elliptic Curve Cryptography (ECC) ...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
AbstractIntegration between wireless sensor networks and traditional IP networks using the IPv6 and ...
ABSTRACT: In this paper, we propose an efficient authenticated key establishment protocols between a...
Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by co...
open access articleAdvancement in wireless sensor network (WSN) technology makes it more attractive ...
Abstract. As wireless sensor networks continue to grow, so does the need for effective security mech...
In wireless sensor networks (WSNs), there are many critical applications (for example, healthcare, v...
[[abstract]]User authentication is a crucial service in wireless sensor networks (WSNs) that is beco...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
In wireless sensor network, most of the queries are issued at the base station or gateway node the n...
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mo...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
AbstractIntegration between wireless sensor networks and traditional IP networks using the IPv6 and ...
ABSTRACT: In this paper, we propose an efficient authenticated key establishment protocols between a...
Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by co...
open access articleAdvancement in wireless sensor network (WSN) technology makes it more attractive ...
Abstract. As wireless sensor networks continue to grow, so does the need for effective security mech...
In wireless sensor networks (WSNs), there are many critical applications (for example, healthcare, v...
[[abstract]]User authentication is a crucial service in wireless sensor networks (WSNs) that is beco...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
In wireless sensor network, most of the queries are issued at the base station or gateway node the n...
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mo...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...