2019
DOI: 10.11591/ijeecs.v15.i1.pp443-450
|View full text |Cite
|
Sign up to set email alerts
|

Light weight authentication protocol for WSN using ECC and hexagonal numbers

Abstract: Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…A system is considered secure when all the security requirements are met successfully [1,8]. These essential requirements range from confidentiality, integrity, authentication, availability, authorization, non-repudiation to privacy, for each one of them we need to ensure security at a different layer from different threat.…”
Section: Iot Security Issuesmentioning
confidence: 99%
See 4 more Smart Citations
“…A system is considered secure when all the security requirements are met successfully [1,8]. These essential requirements range from confidentiality, integrity, authentication, availability, authorization, non-repudiation to privacy, for each one of them we need to ensure security at a different layer from different threat.…”
Section: Iot Security Issuesmentioning
confidence: 99%
“…The data reaches to the intended nodes without being accessed by some third party. In order to ensure confidentiality in IoT, cryptographic techniques such as encryption and hashing need to be implemented, keeping in mind that each attack is specific in nature, the IoT layer and its security impact on overall system, so we need different security mechanisms against each attack [8,10]. Here we discuss each attack in detail and its impact followed by the security measure specific to that attack.…”
Section: Confidentialitymentioning
confidence: 99%
See 3 more Smart Citations