2016
DOI: 10.1155/2016/9297562
|View full text |Cite
|
Sign up to set email alerts
|

Study of Wireless Authentication Center with Mixed Encryption in WSN

Abstract: WSN (wireless sensor network) has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center) with mixed encryption named "MEWAC" is proposed. MEWAC is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Since the sensors in CWSNs are generally energy intensive and computing power limited, Wang et al [17] propose a group key-policy attribute-based encryption with partial outsourcing decryption in WSNs, and Elhoseny et al [18] propose an energy efficient encryption scheme for secure dynamic WSN. Additionally, there are some other encryption methods introduced to CWSNs, such as mixed encryption [19], asymmetric encryption [20], authenticated encryption [21], etc.…”
mentioning
confidence: 99%
“…Since the sensors in CWSNs are generally energy intensive and computing power limited, Wang et al [17] propose a group key-policy attribute-based encryption with partial outsourcing decryption in WSNs, and Elhoseny et al [18] propose an energy efficient encryption scheme for secure dynamic WSN. Additionally, there are some other encryption methods introduced to CWSNs, such as mixed encryption [19], asymmetric encryption [20], authenticated encryption [21], etc.…”
mentioning
confidence: 99%
“…Many existing schemes to collect data in WSN [18,[52][53][54] have used the SHA algorithm to support integrity and authentication. However, these schemes do not address the collision and preimage problems in the SHA algorithm [31][32][33][34][35].…”
Section: -Sha Familymentioning
confidence: 99%
“…The feasibility of CZ-BEEM is proved by an implement of this model. In the field of wireless communication, we have tested the speed of RSA in an embedded platform of STM32 in [16]. And we have tested the acceleration of LDPC decoding with a mobile phone GPU of PowerVR in [17].…”
Section: Description Of Cz Encryptionmentioning
confidence: 99%