2017
DOI: 10.3390/s17050979
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Protocol for Future Sensor Networks

Abstract: Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs w… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 56 publications
(200 reference statements)
0
25
0
Order By: Relevance
“…Biometrics has also applications in e-health security [ 46 ] that can be utilized for smart home wearable devices. Authentication protocols for WSNs and the Internet of Things should be considered as well [ 65 ].…”
Section: Discussionmentioning
confidence: 99%
“…Biometrics has also applications in e-health security [ 46 ] that can be utilized for smart home wearable devices. Authentication protocols for WSNs and the Internet of Things should be considered as well [ 65 ].…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the concern for network threats is not considered in the proposed solution. In [25], the authors proposed a novel, light-weight, efficient key exchange, and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol to ensure data confidentiality and validity. In the proposed solution, the mobile sensor node initiates an authentication process and obtained a re-authentication ticket from BS.…”
Section: Related Workmentioning
confidence: 99%
“…An approach for authenticating sensors is proposed in [10]. Authors claim that they were among the first to propose a scheme that uses concurrent secure connections.…”
Section: Authentication Schemesmentioning
confidence: 99%
“…Moreover, the protocol is intended for devices that are dynamic. More technical details can be reviewed in [10].…”
Section: Authentication Schemesmentioning
confidence: 99%