Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

Two-factor user authentication in wireless sensor networks

ML Das - IEEE transactions on wireless communications, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSN) are typically deployed in an unattended environment,
where the legitimate users can login to the network and access data as and when …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

[图书][B] Handbook of sensor networks: compact wireless and wired sensing systems

M Ilyas, I Mahgoub - 2004 - taylorfrancis.com
As the field of communications networks continues to evolve, the challenging area of
wireless sensor networks is rapidly coming of age. Recent advances have made it possible …

Time synchronization for wireless sensor networks

J Elson, D Estrin - Parallel and Distributed Processing …, 2001 - ieeexplore.ieee.org
Time synchronization is a critical piece of infrastructure for any distributed system.
Distributed, wireless sensor networks make extensive use of synchronized time, but often …

[PDF][PDF] Security vulnerabilities in wireless sensor networks: A survey

T Kavitha, D Sridharan - Journal of information Assurance and …, 2010 - academia.edu
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …

A study of the energy consumption characteristics of cryptographic algorithms and security protocols

NR Potlapally, S Ravi, A Raghunathan… - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
Security is becoming an everyday concern for a wide range of electronic systems that
manipulate, communicate, and store sensitive data. An important and emerging category of …

[图书][B] Wireless sensor network designs

A Hac - 2003 - oms.bdu.ac.in
The emergence of compact, low-power, wireless communication sensors and actuators in
the technology supporting the ongoing miniaturization of processing and storage, allows for …

Analyzing the energy consumption of security protocols

NR Potlapally, S Ravi, A Raghunathan… - Proceedings of the 2003 …, 2003 - dl.acm.org
Security is critical to a wide range of wireless data applications and services. While several
security mechanisms and protocols have been developed in the context of the wired …