2013
DOI: 10.1016/j.adhoc.2012.04.015
|View full text |Cite
|
Sign up to set email alerts
|

: An efficient identity-based broadcast authentication scheme in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
59
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 96 publications
(59 citation statements)
references
References 20 publications
0
59
0
Order By: Relevance
“…Therefore, there are totally 11 sensor nodes receiving the intermediate computation results (2,3,5,6,7,8,10,11,12,15,16), which causes an extra energy consumption of 11 × 0.466 = 5.126mJ in the WSN. In brief, our faster signature verification incurs an extra energy consumption of 1.284 + 5.126 = 6.410mJ for transmitting (i.e., sending and receiving) the intermediate computation results for the WSN in question.…”
Section: Theoretical Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…Therefore, there are totally 11 sensor nodes receiving the intermediate computation results (2,3,5,6,7,8,10,11,12,15,16), which causes an extra energy consumption of 11 × 0.466 = 5.126mJ in the WSN. In brief, our faster signature verification incurs an extra energy consumption of 1.284 + 5.126 = 6.410mJ for transmitting (i.e., sending and receiving) the intermediate computation results for the WSN in question.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…ID-based authentication schemes [7,9,10] have recently attracted substantial attention due to their communication efficiency and support of scalability. The authors in [7] proposed a broadcast authentication scheme using ID-based signatures [23].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations