2015
DOI: 10.1016/j.procs.2015.03.167
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Authentication Mechanism to Secure Re-programming in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The table shows that for some attacks protection methods are not yet developed, or developed methods have the ability to detect but not to prevent the attacks [2].…”
Section: Threat Protection Methods Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The table shows that for some attacks protection methods are not yet developed, or developed methods have the ability to detect but not to prevent the attacks [2].…”
Section: Threat Protection Methods Descriptionmentioning
confidence: 99%
“…The use of Wireless Sensor Networks (WSN) in the concept of IoT is growing, and the problems of WSN security are discussed in a number of research papers [2,3,4,5,6]. In the research [7], the authors analyzed the application of WSN in a military environment in the function of providing services such as information about the presence of a moving vehicle, the detection targets and other events, depending on the defined mission.…”
Section: Previous Researchmentioning
confidence: 99%
“…The study of Nandu and Shekokar [5] designed a conceptual model about the network authentication where the prime focus was laid towards defending DoS attack in WSN. The technique improvised the concept of re-programming along with the ease of decoding-encoding, selection of scope and versioning.…”
Section: Techniques For Routing Based Securitymentioning
confidence: 99%
“…The method uses MAC scheme with the main management to ensure security. Nandu and Shekokar [17] have presented an authentication technique to resist DoS attack in WSN. The technique has used the concept of re-programming to do so.…”
Section: A Routing-based Security Techniquesmentioning
confidence: 99%