Introduction to finite fields and their applications
Introduction to finite fields and their applications
Multireceiver authentication code4: models, bounds, constructions, and extensions
Information and Computation
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Algebraic-Geometric Codes
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Editorial: wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Energy-conserving data placement and asynchronous multicast in wireless sensor networks
Proceedings of the 1st international conference on Mobile systems, applications and services
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Attacking cryptographic schemes based on "perturbation polynomials"
Proceedings of the 16th ACM conference on Computer and communications security
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Wireless sensor network(WSN) authentication schemes are the basic necessary security tool for protecting the communication authenticity and integrity in the network. In this paper we propose general authentication schemes from linear error-correcting codes and rational functions. There are very many different random code and function based authentication schemes with the same security functionality and cost. When these different and random code and function based authentication schemes are used for various parts of one large scale wireless sensor network, the resulted WSN authentication schemes constructed in this paper can resist the compromising of large number of sensor nodes for this large scale wireless sensor network with moderate communication and storage cost. The verification per node in our novel WSN authentication schemes is very fast. Thus WSN authentication schemes based on codes and rational functions can be used to resist the pollution and DoS attacks from the adversary.