2014
DOI: 10.3390/jsan3030224
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks

Abstract: Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multi-hop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof to verify the security of our proposals using Scyther, which is an automatic cryptographic protocols verification tool. We also provide implementation results in terms of exec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 29 publications
(39 reference statements)
0
11
0
Order By: Relevance
“…in [6] designed several authentication protocols in WSN. They propose different multi-hop node authentication protocols and a mechanism to detect possible attack based on their evaluation results.…”
Section: The Security Aspect In Wireless Sensor Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…in [6] designed several authentication protocols in WSN. They propose different multi-hop node authentication protocols and a mechanism to detect possible attack based on their evaluation results.…”
Section: The Security Aspect In Wireless Sensor Networkmentioning
confidence: 99%
“…Indeed, traditional security approaches assume that the best way to set up a security policy in the network is to use a fairly robust encryption system (consisting of very long keys), but such encryption systems can not be used in wireless sensor networks because their storage and computation capacity do not allow it [6]. A security policy for sensor networks is therefore difficult to implement because it is subject to more constraints compared to the management of security in traditional networks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It contains additional optimized protocols, and we present additional in-depth details. Adding new nodes to the network was studied and evaluated in [11,14], and the scalability evaluation of these protocols was studied in [15].…”
Section: Contributionsmentioning
confidence: 99%