2022
DOI: 10.3390/info13030105
|View full text |Cite
|
Sign up to set email alerts
|

Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs

Abstract: Security is one of the major issues in Wireless Sensor Networks (WSNs), as poor security disrupts the entire network and can have a significant effect on data transmission. WSNs need safe data transmission at a high rate while maintaining data integrity. By modifying the Z-MAC protocol and merging it with IHOP and elliptic-curve encryption techniques, the present research produced a novel protocol that enables safe data transfer. Additionally, the paper examined the IHOP technique for secure data transfer base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Almansoori et al [ 33 ] developed Secure Zebra MAC (SZ-MAC) models using elliptic curve cryptography techniques and hob-based intrusion analysis techniques. In this work, an elliptic curve cryptography engine was implemented with random key management functions for securing wireless channels.…”
Section: Methodsmentioning
confidence: 99%
“…Almansoori et al [ 33 ] developed Secure Zebra MAC (SZ-MAC) models using elliptic curve cryptography techniques and hob-based intrusion analysis techniques. In this work, an elliptic curve cryptography engine was implemented with random key management functions for securing wireless channels.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, these keys take time for key generation, registering and distributing, which is mostly associated with most modern used cryptographic keys such as the RSA and ECDH [13]. Wireless sensors and their data must be secured using a lightweight key exchange method to enable real-time data access [16]. Many cryptography protocols have been designed using symmetric and asymmetric algorithms.…”
Section: Introductionmentioning
confidence: 99%