Open Access

ESKA: A Highly Reliable Authentication Protocol Based-on One-way Key Chain for WSN Broadcast


Cite

Vasanth Iyer, Garimella Ram Murthy, M.B. Srinivas, “Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 1, No. 4, December 2008, pp. 912-921,.10.21307/ijssis-2017-327 Search in Google Scholar

Wenyan Fu, Deshi Li, Jian chen, Yanyan Han, Jugen Nie, “Topology Optimization Control with Balanced Energy and Load in Underwater Acoustic Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems Vol. 4, No. 1, March 2011, pp. 138-159.10.21307/ijssis-2017-431 Search in Google Scholar

Sye Loong Keoh, Emil Lupu, Morris Sloman, “Securing Body Sensor Networks: Sensor Association and Key Management[C]”, IEEE International Conference on Pervasive Computing and Communications, IEEE Computer Society, 2009, pp. 53-65. Search in Google Scholar

Du Xiaoming, Chen Yan, “Review on Research status and application of wireless sensor networks [J]”, Beijing Business University (Natural Science Edition), Vol. 26, No.1, 2008, pp. 41–44. Search in Google Scholar

Lang Weimin, Yang Zongkai, “Research on wireless sensor network security [J]”, Computer Science, Vol. 32, No.2, 2008, pp. 54-58. Search in Google Scholar

James Newsome, Elaine Shi, Song Dawn, “The Sybil Attack in Sensor Networks Analysis&Defenses[C]”, In: Proc of Third Intl .Symposium on Information Processing in Sensor Networks (IPSN’ 04), Berkeley, California. USA: ACM press, 2004, pp. 259-268, .10.1145/984622.984660 Search in Google Scholar

Callaway E H. “Wireless Sensor Networks: Architectures and Protocols [M]”, Routledge USA: Auerbach Publications, 2004, pp. 45-57 . Search in Google Scholar

Chris Karlof, David Wagner, “Ad hoc Secure routing in wireless sensor networks: attacks and countermeasures [J]”,Ad Hoc Networks, Vol. 1, No.2-3, 2003, pp. 293-315,.10.1016/S1570-8705(03)00008-8 Search in Google Scholar

T.Jayakumar, C.Babu Rao, John Philip, “Sensors For Monitoring Components, Systems And Processes[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 3, No. 1, March 2010, pp. 61-74.10.21307/ijssis-2017-379 Search in Google Scholar

Tien-Wen Sung, Ting-Ting Wu, Chu-Sing Yang, Yueh-Min Huang, “Reliable Data Broadcast for Zigbee Wireless Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 3, No. 3, September 2010, pp. 504-520.10.21307/ijssis-2017-405 Search in Google Scholar

Mel Siegel, “Scaling Issues in Large Networks of Small Sensors: Energy and Communication Management [J]”, International Journal on Smart Sensing and Intelligent Systems, Vol. 1, No. 1, March 2008, pp. 285-299.10.21307/ijssis-2017-291Search in Google Scholar

Liu Dongang, Peng Ning, “Multi-level μTESLA: Broadcast Authentication for Distributed Sensor Networks[J]”. ACM Transactions in Embedded Computing Systems, Vol. 3, No.4, November 2004, pp. 800-836.10.1145/1027794.1027800 Search in Google Scholar

Sencun Zhu , Sanjeev Setia, Sushil Jajodia , “LEAP+: efficient security mechanisms for large-scale distributed sensor networks[C]”, ACM Transactions on Sensor Networks ,Volume 2 Issue 4, November 2006, pp. 500-528 .10.1145/1218556.1218559 Search in Google Scholar

Liu An, Peng Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks[C]”, 2008. IPSN ‘08. International Conference on Information Processing in Sensor Networks, 2008, pp. 245 - 256,.10.1109/IPSN.2008.47 Search in Google Scholar

Arvinderpal S. Wander , Nils Gura , Hans Eberle , “Energy Analysis of Public--key Cryptography on Small Wireless Devices[C]”, In: Proceedings of the 3rd IEEE Intl Conference on Pervasive Computing and Communications. California: IEEE Computer Society Press, 2005, pp. 324-328. Search in Google Scholar

Piotrowski Krzysztof, Langendoerfer Peter, Peter Steffen, “How public key cryptography influences wireless sensor node lifetime[C]”, Proceeding of the 4th ACM Workshop on Security of AdHoc and Sensor Networks, New York: ACM Press(SASN 2007) , pp. 169-176, .10.1145/1180345.1180366 Search in Google Scholar

Ian. F. Akyildiz, Weilian Su, Yogesh.Sankarasubramaniam, Erdal Cayirci. “Wireless Sensor Networks: A Survey [J]”, Computer Networks, Vol. 38, 2002, pp. 393-422.10.1016/S1389-1286(01)00302-4 Search in Google Scholar

Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler, “SPINS: Security Protocols for Sensor Networks[J]”, Wireless Networks, Vol. 8, No.5, 2002, pp. 521-534.10.1023/A:1016598314198Search in Google Scholar

Hu.Yih-Chun, Jakobsson.Markus, Perrig.Adrian, “Efficient constructions for one-way hash chains[C]”, Applied Cryptography and Network Security. Third International Conference, ACNS 2005. Proceedings (Lecture Notes in Computer Science Vol. 3531), 2005, pp. 423-41. Search in Google Scholar

Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang, “Multi-user Broadcast Authentication in Wireless Sensor Networks”, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp. 223-32.10.1109/SAHCN.2007.4292834Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other