Mobile network security and privacy in WSN

Y Gao, H Ao, Z Feng, W Zhou, S Hu, W Tang - Procedia Computer Science, 2018 - Elsevier
This paper discuss the term threats, attacks and vulnerabilities in Wireless Sensor Networks
followed by a model that relates the three entities. Based on the model, a framework of …

Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network

QA Al-Haija, H Enshasy, A Smadi - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The continuous demand of wireless sensor networks to operate critical and sensitive
environmental, healthcare and industrial data raised the need for effective security …

Communication power analysis of applying MQV key agreement scheme for wireless sensor network

QA Al-Haija, GF Manasra… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In this paper, we are analyzing the amount of communication power consumed from
applying MQV key agreement protocol for wireless sensor network. The estimated power …

Implementing a lightweight Schmidt-Samoa cryptosystem (SSC) for sensory communications

QA Al-Haija, I Marouf, MM Asad… - International Journal on …, 2019 - sciendo.com
One of the remarkable issues that face wireless sensor networks (WSNs) nowadays is
security. WSNs should provide a way to transfer data securely particularly when employed …

An Improved Asymmetric Key Based Security Architecture for WSN

MA Quaum, SU Haider… - … Conference on Computer …, 2018 - ieeexplore.ieee.org
Ubiquitous Healthcare System (U-Healthcare) is a well-known application of wireless sensor
networking (WSN). In this system, the sensors take less power for operating the function. As …

[PDF][PDF] Estimating Energy Consumption of Diffie Hellman Encrypted Key

QA Al-Haija, H Enshasy, A Smadi - researchgate.net
The continuous demand of wireless sensor networks to operate critical and sensitive
environmental, healthcare and industrial data raised the need for effective security …