2014 Global Summit on Computer &Amp; Information Technology (GSCIT) 2014
DOI: 10.1109/gscit.2014.6970116
|View full text |Cite
|
Sign up to set email alerts
|

Secure and time efficient hash-based message authentication algorithm for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Although the computational cost of the hash function is relatively large compared to other operations, the hash function is a relatively low-cost function in the encryption method. Meanwhile, the literature [32] proved that hash function can be applied to WSN. In addition, the proposed scheme is simple arithmetic operation, logical operation and bit operation except hash operation.…”
Section: Computation and Communication Overheadmentioning
confidence: 99%
“…Although the computational cost of the hash function is relatively large compared to other operations, the hash function is a relatively low-cost function in the encryption method. Meanwhile, the literature [32] proved that hash function can be applied to WSN. In addition, the proposed scheme is simple arithmetic operation, logical operation and bit operation except hash operation.…”
Section: Computation and Communication Overheadmentioning
confidence: 99%
“…ScalabiliThe backbone of Wireless Sensor Networks (WSN) is scalability, efficiency, and management limited in what they can do because of resource issues, including battery life, computational power, and memory. The requirement for efficient resource management to extend the network's lifespan is just one of the many difficulties associated with WSNs [9].…”
Section: Routing Challenges and Design Issuesmentioning
confidence: 99%
“…To detect Sybil attack, malicious node may send same RSSI beacon with different IDs [27], suspect the node and locate the attacked area, using network flow graph, find massage digest using MD5/SHA1. Hacker spoof link layer ACK and overhead by ACK packets on the network [28] d. Transport Layer Attacks: Adversary node sends many requests to victim for connection and victim must allocate memory for store connection state information, but this overhead less compare to flooding. Protocols are connectionless therefore naturally stateless, but they are not providing proper transport level services for network.…”
Section: B Types Of Attacks On Networked Protocol Stackmentioning
confidence: 99%