Shorter hash-based signatures

GCCF Pereira, C Puodzius, PSLM Barreto - Journal of Systems and …, 2016 - Elsevier
We describe an efficient hash-based signature scheme that yields shorter signatures than
the state of the art. Signing and verification are faster as well, and the overall scheme is …

Cooperative hybrid self‐healing scheme for secure and data reliability in unattended wireless sensor networks

AS Elsafrawey, ES Hassan… - IET Information …, 2015 - Wiley Online Library
Unattended wireless sensor networks (UWSNs) are operated in hostile environments
without constant supervision by a trusted sink; so it faces the risk of compromising by …

Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare

FS Babamir, A Norouzi - The Computer Journal, 2014 - academic.oup.com
In this study, we propose an efficient aggregate signcryption scheme to maximize the
security of data in a kind of wireless medical network named the disconnected or unattended …

Distributed data survivability schemes in mobile unattended wireless sensor networks

SKVL Reddy, S Ruj, A Nayak - 2012 IEEE global …, 2012 - ieeexplore.ieee.org
In a mobile Unattended Wireless Sensor Network (UWSN), a trusted sink visits each sensor
node periodically to collect data. Data has to be secured until the next visit of the sink …

Data authentication scheme for unattended wireless sensor networks against a mobile adversary

SKVL Reddy, S Ruj, A Nayak - 2013 IEEE wireless …, 2013 - ieeexplore.ieee.org
An Unattended Wireless Sensor Network (UWSN) is a type of sensor network where a
trusted sink visits each node periodically to collect the data. Due to the offline nature of this …

[PDF][PDF] Energy Aware Compressive Sensing Assisted Secure Data Survivability and Data Collection in Unattended Wireless Sensor Networks.

N Hegde, L Kulkarni - International Journal of Intelligent Engineering & …, 2022 - inass.org
Mobile sink-based sensor networks deployed in unattended environment are characterized
by infrequent sink visits. In these applications, ensuring the survivability and confidentiality of …

Design and implementation of data survival in unattended wireless sensor networks

MAS Santos, CB Margi - 30th IEEE International Performance …, 2011 - ieeexplore.ieee.org
In Wireless Sensor Networks, the base station is generally the only unconditionally trusted
entity. If it is not connected for a period of time, the network is left unattended and sensor …

Achieving data survivability and confidentiality in unattended wireless sensor networks

A Sen, S Ghosh, A Basak, HP Puria… - 2015 IEEE 29th …, 2015 - ieeexplore.ieee.org
In Unattended Wireless Sensor Networks (UWSNs) the nodes are subjected to hostile
environment for sensing critical data. Due to the unattended nature of the network the sink is …

[图书][B] Security and data reliability in cooperative wireless networks

E Hassan - 2018 - taylorfrancis.com
Following a detailed overview of cooperative communications and the physical layer
security, this book proposes relay and jammer selection schemes for security in one-way …

[PDF][PDF] ANALYSIS OF TRUST MANAGEMENT IN UNATTENDED WIRELESS SENSOR NETWORKS

S Kaviya, KR Singh - ijcrcst.co.in
An Unattended Wireless Sensor Network (UWSN) is a type of sensor network where a
trusted sink visits each node periodically to collect the data. Due to offline nature of this …