2020
DOI: 10.1002/dac.4384
|View full text |Cite
|
Sign up to set email alerts
|

Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks

Abstract: Wireless sensor networks (WSNs) are widely used in large areas of applications; due to advancements in technology, very tiny sensors are readily available, and their usage reduces the cost. The mechanisms designed for wireless networks cannot be implied on networks with tiny nodes due to battery and computational constraints. Understanding the significance of security in WSNs and resource constraintness of tiny WSNs, we propose a node authentication mechanism for nodes in wireless sensor networks to avoid secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 33 publications
(46 reference statements)
0
9
0
Order By: Relevance
“…Traceability The existing authentication protocols [16,19,20] cannot offer a reliable feature of traceability as the pseudo-identities are known to the communication network. However, the proposed S-USI can compute the real identities of client/server to protect the pseudonym identities when M d ∕M s derives the anonymity function using key = PRF S k (H(I d )) ⊕ H � (S k 0 ) .…”
Section: Resilient To Replay Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…Traceability The existing authentication protocols [16,19,20] cannot offer a reliable feature of traceability as the pseudo-identities are known to the communication network. However, the proposed S-USI can compute the real identities of client/server to protect the pseudonym identities when M d ∕M s derives the anonymity function using key = PRF S k (H(I d )) ⊕ H � (S k 0 ) .…”
Section: Resilient To Replay Attackmentioning
confidence: 99%
“…The Eqs. (15) and (16) hold owing to A Rule of Key Freshness ⟨I R6 , I R7 ⟩ and BAN Logic Assumption ⟨A⟩ 4 . To achieve the Eq.…”
Section: Security Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…As calculated or suggested by authors in References 25,26, the computation complexity of the operations can be defined as (Elliptic Curve Cryptography(ECC) ≫ Private key cryptography > Hash). In Table 2, we calculated the computation cost for NHC, 7 CLUSS 9 protocol, and the proposed protocol.…”
Section: Performance Evaluationmentioning
confidence: 99%