2014
DOI: 10.1007/s11277-014-2115-2
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Authentication Protocol in Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Furthermore, the proposed solution overlooks data security in terms of integrity, privacym and node-level authentication, which results in compromised nodes and network reliability. A secure and authentication protocol in WSN is proposed in [60], which tries to improve data security with minimal communication overheads. The proposed solution uses mutual authentication protocol by using a timestamp and generates a unique session key for the new data transmission phase.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the proposed solution overlooks data security in terms of integrity, privacym and node-level authentication, which results in compromised nodes and network reliability. A secure and authentication protocol in WSN is proposed in [60], which tries to improve data security with minimal communication overheads. The proposed solution uses mutual authentication protocol by using a timestamp and generates a unique session key for the new data transmission phase.…”
Section: Related Workmentioning
confidence: 99%
“…Note at this level that the attacks faced by WSNs are of various kinds [28,29] : -Denial of services : this type of attack comes through the help of external sensors.…”
Section: The Security Aspect In Wireless Sensor Networkmentioning
confidence: 99%
“…A mutual authentication protocol was presented in [11] with the timestamp in WSN. The designed protocol generated a new session key for every session.…”
Section: A Related Workmentioning
confidence: 99%