A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …

Seda: Scalable embedded device attestation

N Asokan, F Brasser, A Ibrahim, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …

Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

Cyber security analysis and protection of wireless sensor networks for smart grid monitoring

D He, S Chan, M Guizani - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
In order to overcome the limitations of traditional monitoring technologies (eg, those relying
on wired networks), more and more real-time status monitoring systems based on wireless …

A review on lightweight node authentication algorithms in wireless sensor networks

V Mohindru, Y Singh, R Bhatt - 2018 Fifth International …, 2018 - ieeexplore.ieee.org
Wireless sensor nodes are prone to several critical attacks due to the distributed placement
of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN …

Simple, secure, efficient, lightweight and token based protocol for mutual authentication in wireless sensor networks

R Rathore, M Hussain - … and Applications: ERCICA 2015, Volume 1, 2015 - Springer
Abstract Wireless Sensor Networks are being widely used in many real time applications
that require continuous monitoring and maintenance of surroundings and their environment …

Secure message transmission scheme in wireless sensor networks

KA Ameen, BA Mahmood, YNA Taher - Bulletin of Electrical Engineering …, 2021 - beei.org
Wireless sensor networks (WSNs) have been the subject of intensive research in the past
few years and the backbone of most maximum present information technology. WSNs have …

A deeper insight on developments and real-time applications of smart dust particle sensor technology

S Sathyan, SR Pulari - Computational Vision and Bio Inspired Computing, 2018 - Springer
Sensors are the major technological advancements which have contributed abundantly in
the field of IoT, Big Data etc. Sensors are used to sense, detect and respond to various …

Impact of cyber security threats on IoT applications

A Gawade, NM Shekokar - Cyber Security Threats and …, 2022 - taylorfrancis.com
The internet of things (IoT) is at the groundbreaking edge of innovation, rapidly shaping our
technological future at an astounding rate and making information freely accessible in real …

A comprehensive survey of existing security techniques in the IOT protocol stack

SS Ambarkar, NM Shekokar - Cyber Security Threats and …, 2022 - taylorfrancis.com
The internet of things (IoT) provides a novel vision to the internet user. It also provides
computational and economical convenience by connecting each object with the internet …