Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
SPINS: security protocols for sensor networks
Wireless Networks
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Hi-index | 0.01 |
One of the major challenges for wireless sensor networks is to find out a suitable authentication scheme due to the constraints of computational capacity, power and storage size. Many researchers have focused on public or symmetric key cryptography and proposed the identity-based encryption techniques. In our previous work, we proposed also an identity-based authentication framework that guarantees the safe defense against different kinds of attacks like hello flood, wormhole, sinkhole, location deployment attack, and man in the middle attack. But, the previous identity-based authentication scheme was much vulnerable to malicious attacker masquerading as a neighbor node. So in this paper, we have improved our previous identity-based authentication scheme and proposed a robust secure protocol that can audit forged attacker nodes for wireless sensor networks.