2017
DOI: 10.1007/s11042-017-5376-4
|View full text |Cite
|
Sign up to set email alerts
|

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
64
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(67 citation statements)
references
References 44 publications
0
64
0
Order By: Relevance
“…Compared to [16], [17], [41], [42], LSSCW requires few additional hash operations for session key generation process. The session key is used in the data transfer phase for secure transfer and verification of data between DCH and BS.…”
Section: A Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to [16], [17], [41], [42], LSSCW requires few additional hash operations for session key generation process. The session key is used in the data transfer phase for secure transfer and verification of data between DCH and BS.…”
Section: A Comparative Analysismentioning
confidence: 99%
“…LSSCW session key helps in sender authentication and protection against Man-in-the-middle attack. The schemes presented in [16], [17], [41], [42] do not use session key thereby providing a less secure environment compared to LSSCW for data communication in WSN.…”
Section: A Comparative Analysismentioning
confidence: 99%
“…According to recent research studies,() the network model adopted in heterogeneous WSNs usually contains 3 entities: the GWN , the sensor node, and the user. Gateway node : The GWN is a trusted third party with powerful communication and computation capabilities, and plays a key role in the generation of session keys for users and sensor nodes.…”
Section: Preliminariesmentioning
confidence: 99%
“…In heterogeneous networks, Weight Based Clustering technique is adopted. The framework chooses the better cluster heads thereby increasing the lifetime and throughput of WSN through efficient clustering algorithm [20]. Also, clustering increases the scalability and network life span.…”
Section: A System Modelmentioning
confidence: 99%