2022
DOI: 10.1016/j.egyr.2022.02.061
|View full text |Cite
|
Sign up to set email alerts
|

Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…As per the evaluation, the number of malicious injections over the IHFs gradually increases due to various channel attacks, as mentioned earlier. These malicious nodes are being caught in IHF traps continuously and being misled into distributed wireless honeypot engines running in each sensor node [ 61 , 62 ].…”
Section: Resultsmentioning
confidence: 99%
“…As per the evaluation, the number of malicious injections over the IHFs gradually increases due to various channel attacks, as mentioned earlier. These malicious nodes are being caught in IHF traps continuously and being misled into distributed wireless honeypot engines running in each sensor node [ 61 , 62 ].…”
Section: Resultsmentioning
confidence: 99%
“…However, the throughput achieved by this method is moderate. Yang et al [14], as so to improve the security and data collection capacity the light weight security protocols are introduced. This method produces more security and efficiency.…”
Section: Comprehensive Survey 21 Trust Oriented Wireless Sensor Networkmentioning
confidence: 99%
“…Furthermore, this attack requires quality of service and allows consumption of several channels. Every channel has its own TKIP sequence counter, respectively, but channel 0 has the ability to hold down the most traffic [77].…”
Section: Back and Tew's Improved Attackmentioning
confidence: 99%
“…The diagram below (Figure 8) shows the view of a Black hole attack when it is found in a network. In contrast, in the Wormhole attack, the attacker tries to keep a record of a packet at a single location and tunnels it through to another location [77]. Diagrammatically, the worm hole attack can be showed as below Figure 9.…”
Section: Active Attacksmentioning
confidence: 99%