2016
DOI: 10.1002/cpe.3986
|View full text |Cite
|
Sign up to set email alerts
|

PAWN: a payload‐based mutual authentication scheme for wireless sensor networks

Abstract: Summary Wireless sensor networks (WSNs) consist of resource‐starving miniature sensor nodes deployed in a remote and hostile environment. These networks operate on small batteries for days, months, and even years depending on the requirements of monitored applications. The battery‐powered operation and inaccessible human terrains make it practically infeasible to recharge the nodes unless some energy‐scavenging techniques are used. These networks experience threats at various layers and, as such, are vulnerabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 63 publications
(27 citation statements)
references
References 27 publications
0
27
0
Order By: Relevance
“…The system uses a hierarchal password-based key derivation function to provide data confidentiality at each intermediate node. Jan et al [28] propose a lightweight payload-based mutual authentication scheme for a clusterbased hierarchical WSN. The proposed scheme operates in two steps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The system uses a hierarchal password-based key derivation function to provide data confidentiality at each intermediate node. Jan et al [28] propose a lightweight payload-based mutual authentication scheme for a clusterbased hierarchical WSN. The proposed scheme operates in two steps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Shamshirband, Shahaboddin 2014 [9] As the DDos service attacks have very dispersed nature due to this is get more difficult to detect such attacks by the use of conventional attack detecting methods in wireless sensor networks (WSNs). In this present paper a new method is commence which is game based fuzzy Q learning.…”
Section: Pelechrinis Konstantinos Mariosiliofotou 2011asmentioning
confidence: 99%
“…Their application to WSNs deteriorates the network performance and rapidly depletes the network lifetime. As a result, designing lightweight but highly intelligent and robust security solutions is a challenging task in these networks [7]. Trust and reputation systems have a significant role in supporting operation of a wide range of distributed systems, from wireless sensor networks and e-commerce infrastructure to social networks, by providing an assessment of trustworthiness of participants in such [18].…”
Section: Related Workmentioning
confidence: 99%