63
Views
9
CrossRef citations to date
0
Altmetric
Articles

A proposed scheme to achieve node authentication in military applications of wireless sensor network

, &

References

  • M. Winkler, Michael Street, Klaus-Dieter Tuchs, Konrad Wrona, “Wireless Sensor Networks for military purposes”, Springer-Verlag Berlin Heidelberg, pp: 365-394 (Nov 2013).
  • Tarek Azzabi, Hassene Farhat, Nabil Sahil “Wireless Sensor Networks Security Issues and Military Specifications”, IEEE International Conference on Advanced Systems and Technologies (IC_ASET), pp: 978-5090-6634-6 (2017).
  • S. Subasree, N.K. Sakthivel “Design of a new security protocol using hybrid cryptography algorithm”, International Journal of Research and Reviews in Applied Sciences, pp: 95-103 (2010).
  • N. Kumar “A secure Communication Wireless Sensor Network through Hybrid (AES+ECC) Algorithm”, von LAP LAMBERT Academic publishing, vol. 386 (2012).
  • Rawya Rizk, Yasmin Alkady “Two-phase hybrid cryptography algorithm for wireless sensor networks”, International Journal of Electrical System and Information Technology, pp: 296-313 (2015). doi: 10.1016/j.jesit.2015.11.005
  • Shi-hai Zhu “Research of hybrid cipher algorithm application to hydraulic information transmission”, International Conference on, Electronics, Communication and Control (ICECC), pp: 3873–3876. IEEE (2011).
  • Seung-Hyun Seo, Salmin Sultana “Effective Key Management in Dynamic Wireless Sensor Networks”, IEEE Transactions on Information Forensics and Security, vol. 10, NO. 2, pp: 1556-6013 (Feb 2015).
  • Dieynaba Mall, Karim Konate, Al-Sakib Khan Pathan “ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN”, NSysS 2017, Department of CSE, BUET, pp: 978-1-5090-3260-0, 2017.
  • Jaewoo Choi, Jihyun Bang, Lee Hyung Kim, Mirim Ahn And Tae-kyoung Kwon “Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks”, IEEE Systems Journals, vol. 11, Issue 2, pp: 494-502 (2017). doi: 10.1109/JSYST.2015.2422736
  • Matthew Musson, “Attacking the Elliptic Curve Discrete Logarithm Problem”, Master of Science (Mathematics and Statistics) Thesis, Acadia University, Canada.
  • S. Gaur, A.K. Mohapatra, R. Roges “An Efficient Certificateless Authentication Encryption for WSN Based on Clustering Algorithm”, International Journal of Applied Engineering Research, vol. 12, no. 14, pp: 4184-4190 (2017).
  • Farooq Anhum “Location dependent key management in sensor networks without using deployment knowledge”, Springer-Verlag Berlin Heidelberg, pp: 1587-1600 (2013).
  • G. Singh, Supriya, “A Study of encryption algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38 (April 2013). doi: 10.5120/11507-7224
  • O. Cheikhrouhou, “Secure Group Communication in Wireless Sensor Networks: A survey”, Journal of Network and Computer Applications, Vol. 61, pp. 115-132 (2016). doi: 10.1016/j.jnca.2015.10.011
  • Y. Liu, J. Li, and M. Guizani, “PKC based broadcast authentication using signature amortization for WSNs,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106–2115 (2016).
  • M. Zhou, M. Zhang, C. Wang, and B. Yang, “Cclas: A practical and compact certificateless aggregate signature with share extraction,” International Journal of Network Security, vol. 16, no. 2, pp. 157-164 (2014).
  • D. He, M. Khan, and S. Wu, “On the security of a rsa-based certificateless signature scheme,” International Journal of Network Security, vol. 15, no. 6, pp. 408-410 (2013).
  • P. Gong and P. Li, “Further improvement of a certificate-less signature scheme without pairing,” International Journal of Communication Systems, vol. 27, no. 10, pp. 2083-2091 (2014). doi: 10.1002/dac.2457
  • J. Tsai, N. Lo, and T. Wu, “Weaknesses and improvements of an efficient certificate-less signature scheme without using bilinear pairings”, International Journal of Communication Systems, vol. 27, no. 7, pp. 1083-090 (2014). doi: 10.1002/dac.2388
  • P. Sruthi, S. Jhansi Rani, “Implementation of Asymmetric Security Module in NS2”, International Journal of Advanced Technology and Innovative Research, vol. 9, Issue 1, pp: 0156-0161 (2017).
  • Kakelli Anil Kumar, Addepalli V. N. Krishna & K. Shahu Chatrapati, New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences, 38:2, 341-365 (2017 ), DOI: 10.1080/02522667.2016. doi: 10.1080/02522667.2016.1220092
  • K. Lingaraj, Rajashree V. Biradar & V. C. Patil, OMMIP: An optimized multiple mobile agents itinerary planning for wireless sensor networks, Journal of Information and Optimization Sciences, 38:6, 1067-1076 (2017 ), DOI: 10.1080/02522667.2017. doi: 10.1080/02522667.2017.1374740
  • Addepalli V. N. Krishna, A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography, Journal of Information and Optimization Sciences, 39:6, 1387-1399 (2018 ), DOI: 10.1080/02522667.2018. doi: 10.1080/02522667.2018.1507762

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.