2022
DOI: 10.1016/j.simpat.2022.102522
|View full text |Cite
|
Sign up to set email alerts
|

WSN node access authentication protocol based on trusted computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…It uses a trust formula based on the stochastic process since the restoration of trust levels under assault is quicker in the Gaussian and other distributions. Liu et al [12] WSN based medical and environmental based vulnerabilities are taken into consideration. This method provides good results in terms of efficiency and security.…”
Section: Comprehensive Survey 21 Trust Oriented Wireless Sensor Networkmentioning
confidence: 99%
“…It uses a trust formula based on the stochastic process since the restoration of trust levels under assault is quicker in the Gaussian and other distributions. Liu et al [12] WSN based medical and environmental based vulnerabilities are taken into consideration. This method provides good results in terms of efficiency and security.…”
Section: Comprehensive Survey 21 Trust Oriented Wireless Sensor Networkmentioning
confidence: 99%
“…The attacker hijacks a sensor node or IoT device to take over the network, remove the node from the network, and redeploys it as a malicious node. [64,75,76] key compromise impersonation (KCI) attack The attacker installs the client's certificate on the device and can then impersonate it. [77] An essential aspect of security that must be considered in IoT systems is the implementation of the CIA triad (confidentiality, integrity, availability).…”
Section: Denial Of Service (Dos) Attackmentioning
confidence: 99%
“…In our protocol, the access request {M 1 , M 2 , T 1 , T S i } does not contain any information about the password, so the adversary cannot guess the user's password through this way. Assuming that the adversary gets a smart card of a legitimate user U i and guesses that U i 's identity is ID * ∈ {0, 1} n and password is P W * ∈ {0, 1} n , the probability of ID * = ID i and P W * = P W i is 1 2 2n , which is negligible. Therefore, the protocol can prevent off-line password guessing attack.…”
Section: Resisting Off-line Password Guessing Attackmentioning
confidence: 99%
“…Wireless sensor networks are composed of a large number of resource-constrained and self-organized sensor nodes, mostly used in environmental monitoring, smart healthcare, precision agriculture, and other fields [1,2]. The pivotal wireless communication and data fusion technologies have become increasingly mature in WSNs.…”
Section: Introductionmentioning
confidence: 99%