2015
DOI: 10.1016/j.adhoc.2014.06.008
|View full text |Cite
|
Sign up to set email alerts
|

A survey of broadcast authentication schemes for wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 33 publications
0
17
0
1
Order By: Relevance
“…In this subsection, we will review only the works that are not reviewed in the survey [165] and the articles published in 2016 related to authentication protocols for IoS. For more details about the articles published before 2016, we refer the reader to six surveys published in 2013, 2014, and 2015, namely, [269], [270], [271], [272], [273], [274].…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…In this subsection, we will review only the works that are not reviewed in the survey [165] and the articles published in 2016 related to authentication protocols for IoS. For more details about the articles published before 2016, we refer the reader to six surveys published in 2013, 2014, and 2015, namely, [269], [270], [271], [272], [273], [274].…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…The basic concepts of TESLA are based on [28]: 1. The time slots: each packet Pi is authenticated separately, with MAC.…”
Section: Securing Sensors Using Teslamentioning
confidence: 99%
“…Many standard attacks can be restricted as discussed here. 8.1a Man in the middle attack: There are various techniques for overcoming the man in the middle (MITM) attack in literature [32]. Based on the measured RTT and Wi-fi RSS the MITM is detected and located.…”
Section: Security Of the Proposed Frameworkmentioning
confidence: 99%