2008
DOI: 10.1016/j.comcom.2007.10.017
|View full text |Cite
|
Sign up to set email alerts
|

IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
101
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(101 citation statements)
references
References 16 publications
0
101
0
Order By: Relevance
“…Although there is a prejudice against the feasibility of PKC in WSN, recent studies [6,7] have reported that PKC is possible in WSNs. Thus, several PKC-based broadcast authentication protocols have been proposed [7,8,9,10].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Although there is a prejudice against the feasibility of PKC in WSN, recent studies [6,7] have reported that PKC is possible in WSNs. Thus, several PKC-based broadcast authentication protocols have been proposed [7,8,9,10].…”
Section: Related Workmentioning
confidence: 99%
“…In Section 3, we give a brief introduction to elliptic curve cryptography and vBNN-IBS [9]. Section 4 describes the proposed acceleration technique for signature verification in WSNs.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The base station authentication in WSN is same as the traditional networks where the base station are registered and authenticated by other base stations. The base station authentication has been addressed deeply in many research papers [2,3]. The sensor node authentication can be done by the base station and other sensor nodes.…”
Section: Introductionmentioning
confidence: 99%