The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.1007/s11276-014-0792-0
|View full text |Cite
|
Sign up to set email alerts
|

Secure authentication and integrity techniques for randomized secured routing in WSN

Abstract: As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these types of network. In order to overcome security and integrity issues, a secure authentication and integrity technique is proposed. In this technique, shared keys are used for providing authentication. Here, mutual authentication technique allows the sender and recipient to share a common key matrix as an authentication key. Both sender and recipient chose a random noise matrix and verifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…In the heterogeneous OOSC, the sender belongs to the IBC and the receiver belongs to the PKI. Senthil kumaran and Ilango [25] used the heterogeneous OOSC to design a secure routing in the WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…In the heterogeneous OOSC, the sender belongs to the IBC and the receiver belongs to the PKI. Senthil kumaran and Ilango [25] used the heterogeneous OOSC to design a secure routing in the WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…The SHARP has improved energy efficiency with an awareness of different attacks such as impersonation, node insertion, denial of service (DoS), node capturing, reply, and guessing attack. Different routing protocols [19–28] have been proposed to handle the security problems to prevent the data from malicious attacks. The metric load balance will affect the route security in terms of data loss, but not discussed in the existing protocols.…”
Section: Problem Methodology and Network Modelmentioning
confidence: 99%
“…Senthilkumaran et al . [19] proposed a secure authentication protocol by allowing the sender and recipient to share a common key matrix as an authentication key. The sender chooses a random noise matrix and sends it to the recipient.…”
Section: Related Workmentioning
confidence: 99%
“…In another study [18], a secure authentication and integrity technique was proposed. Digital signature and public key encryption were used in the model.…”
Section: Related Workmentioning
confidence: 99%