A security protocol based-on mutual authentication application toward wireless sensor network

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents an application of security protocol based-on mutual authentication procedure between involved entities that providing data and network security in wireless sensor environment communication. Through WSN, a user can access base station of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where involved entities are mutual strongly verified before accessing the data. The proposal provides secure features standards such as data integrity, mutual authentication and session key establishment. Furthermore, an extensive analysis shows that the proposed scheme possesses many advantages against popular attacks, achieves better efficiency and can be safeguard to real wireless sensor network applications.

Cite

CITATION STYLE

APA

Bruce, N., Kang, Y. J., Kim, H. R., Park, S. H., & Lee, H. J. (2015). A security protocol based-on mutual authentication application toward wireless sensor network. Lecture Notes in Electrical Engineering, 339, 27–34. https://doi.org/10.1007/978-3-662-46578-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free