Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4749
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ruj, Sushmita | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:35:22Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:35:22Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Reddy, S. K. V. L., Ruj, S., & Nayak, A. (2013). Data authentication scheme for unattended wireless sensor networks against a mobile adversary. Paper presented at the IEEE Wireless Communications and Networking Conference, WCNC, 1836-1841. doi:10.1109/WCNC.2013.6554843 | en_US |
dc.identifier.isbn | 9781467359399 | - |
dc.identifier.issn | 1525-3511 | - |
dc.identifier.other | EID(2-s2.0-84881561595) | - |
dc.identifier.uri | https://doi.org/10.1109/WCNC.2013.6554843 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4749 | - |
dc.description.abstract | An Unattended Wireless Sensor Network (UWSN) is a type of sensor network where a trusted sink visits each node periodically to collect the data. Due to the offline nature of this network, every node has to secure its data until the next visit of the sink which makes the network susceptible of attacks focusing on the data collected. In this work, we focus on the data authentication in the presence of a mobile adversary aiming to modify the data without being detected. We propose a data authentication scheme which uses inexpensive cryptographic primitives and few message exchanges. The proposed scheme is analyzed both mathematically and using simulations proving that the proposed scheme is better than the previous schemes in terms of security and communication overhead. © 2013 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.source | IEEE Wireless Communications and Networking Conference, WCNC | en_US |
dc.subject | Communication overheads | en_US |
dc.subject | Cryptographic primitives | en_US |
dc.subject | Data authentication | en_US |
dc.subject | ITS data | en_US |
dc.subject | Message exchange | en_US |
dc.subject | Mobile adversary | en_US |
dc.subject | security | en_US |
dc.subject | Unattended wireless sensor networks | en_US |
dc.subject | Authentication | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Wireless telecommunication systems | en_US |
dc.subject | Sensor nodes | en_US |
dc.title | Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: