An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data. In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed scheme...
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message...
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and dissemina...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable da...
Wireless Sensor Networks (WSNs) consisting of a large number of sensor nodes are being deployed in p...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
Wireless Sensor Networks (WSNs) appeal to a wide range of applications that involve monitoring of va...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
Wireless sensor networks (WSNs) promise to greatly enhance and simplify the collection of sensor dat...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
Abstract—Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their dis...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message...
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and dissemina...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable da...
Wireless Sensor Networks (WSNs) consisting of a large number of sensor nodes are being deployed in p...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
[[abstract]]Authentication is an important service in wireless sensor networks (WSNs) for an unatten...
Wireless Sensor Networks (WSNs) appeal to a wide range of applications that involve monitoring of va...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
Wireless sensor networks (WSNs) promise to greatly enhance and simplify the collection of sensor dat...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Thin...
Abstract—Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their dis...
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (...
User authentication and key management are two important security issues in WSNs (Wireless Sensor Ne...
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message...
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and dissemina...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...