2018
DOI: 10.1016/j.procs.2018.03.083
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Network Security and Privacy in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…This research method is prone to side-channel attacks since the ciphertext can be attained. 60 This study presents digital signature based on key management (DK) for data security. 61 Asymmetric method doubles the computation time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This research method is prone to side-channel attacks since the ciphertext can be attained. 60 This study presents digital signature based on key management (DK) for data security. 61 Asymmetric method doubles the computation time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These schemes are often based on login credentials with stored authentication values or private/public key schemes. Attacks can originate from traditionally expected adversaries located inside or outside the network or from previously trusted nodes acting maliciously [21], [22], [23]. Recent advancements in wearable wireless sensors with quality requirements namely, energy, memory, and computational efficiency further incorporate ZKP to provide lightweight authentication with appropriate commitment schemes [24], [25].…”
Section: Related Workmentioning
confidence: 99%
“…Yuan Gao et al proposed a security mechanism based on the sensor nodes [8] that reduced the possibility of the attack effects. They divided nodes into two groups: 1) nodes exposed to attacks from credentials and 2) unauthorized nodes.…”
Section: Related Workmentioning
confidence: 99%