Literature DB >> 25106827

On securing wireless sensor network--novel authentication scheme against DOS attacks.

K Nirmal Raja1, M Marsaline Beno.   

Abstract

Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

Entities:  

Mesh:

Year:  2014        PMID: 25106827     DOI: 10.1007/s10916-014-0084-3

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  5 in total

1.  An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

Authors:  Rui Guo; Qiaoyan Wen; Huixian Shi; Zhengping Jin; Hua Zhang
Journal:  J Med Syst       Date:  2013-08-31       Impact factor: 4.460

2.  A secure biometrics-based authentication scheme for telecare medicine information systems.

Authors:  Xiaopeng Yan; Weiheng Li; Ping Li; Jiantao Wang; Xinhong Hao; Peng Gong
Journal:  J Med Syst       Date:  2013-08-31       Impact factor: 4.460

3.  A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

Authors:  Zuowen Tan
Journal:  J Med Syst       Date:  2014-03-19       Impact factor: 4.460

4.  Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems.

Authors:  Tsung-Hung Lin; Tian-Fu Lee
Journal:  J Med Syst       Date:  2014-04-08       Impact factor: 4.460

5.  Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

Authors:  Wei-Chuen Yau; Raphael C-W Phan
Journal:  J Med Syst       Date:  2013-11-06       Impact factor: 4.460

  5 in total
  1 in total

1.  Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

Authors:  K Nirmal Raja; M Maraline Beno
Journal:  J Med Syst       Date:  2017-05-26       Impact factor: 4.460

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.