2021 International Conference on Electrical Engineering and Informatics (ICEEI) 2021
DOI: 10.1109/iceei52609.2021.9611135
|View full text |Cite
|
Sign up to set email alerts
|

New Framework for Authentication and key Establishment to Secure 6LoWPAN Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Authentication refers to a set of security forces that ensure data have come from the source and have not been tampered with along the way [136]. Its approach ensures that active attacks, such as DoS and spoofing are mitigated.…”
Section: Authenticationmentioning
confidence: 99%
“…Authentication refers to a set of security forces that ensure data have come from the source and have not been tampered with along the way [136]. Its approach ensures that active attacks, such as DoS and spoofing are mitigated.…”
Section: Authenticationmentioning
confidence: 99%
“…Engaging in Personal Interactive Transmission Sessions via TCP streams may introduce difficulties concerning the security of transmitting personal data, the integrity of communication, and possible limitations in performance [7]. The Common Weakness Enumeration (CWE) 319: "Cleartext Transmission of Sensitive Information" Web Application Vulnerabilities Index focuses on the possible risk of personal or confidential data being transmitted without encryption, which could result in the data being exposed in cleartext or plaintext and susceptible to eavesdropping by unauthorised individuals [8].…”
Section: Introductionmentioning
confidence: 99%
“…Some of these lightweight encryption algorithms were analyzed in [14] to show that AES requires a high rate of power consumption. Furthermore, other works have proposed lightweight authentication algorithms for WSN [15] and others have used watermarking technology for the authentication process also [16] to reduce security costs and extend the WSN lifetime.…”
Section: Introductionmentioning
confidence: 99%