2012 IEEE Symposium on Wireless Technology and Applications (ISWTA) 2012
DOI: 10.1109/iswta.2012.6373839
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of ID-based authentication On Zigbee transceiver

Abstract: It is widely recognized that wireless sensors are not only resource constrained but are vulnerable to outsider and insider attacks. As such wireless sensor networks (WSNs) have to be designed using low energy wireless sensor devices as well be implemented with due consideration for the security of the network. In a previous work, we have identified IBE as one of the most suitable protocol for WSN. In this paper, we present an implementation of the IBE-Trust protocol on workstations, which then, communicate wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…An offline and online ID-based authentication scheme is proposed in [66]. The offline phase is used to store the general parameters and the base station public key in each sensor.…”
Section: Then the Sender Can Check The Correctness Of The Value By Checking If Itmentioning
confidence: 99%
“…An offline and online ID-based authentication scheme is proposed in [66]. The offline phase is used to store the general parameters and the base station public key in each sensor.…”
Section: Then the Sender Can Check The Correctness Of The Value By Checking If Itmentioning
confidence: 99%