Dynamic Message Puzzle as Pre-Authentication Scheme in Wireless Sensor Networks
A. Mahmood, H. Yiğitler, R. Virrankoski, and R. Jäntti, “Recursive clock skew estimation for wireless sensor networks using reference broadcasts,” IET Wirel. Sens. Syst., vol. 2, no. 4, pp. 338–350, 2012.
D. R. Wijaya, R. Sarno, E. Zulaika, and S. I. Sabila, “Development of mobile electronic nose for beef quality monitoring,” in Procedia Computer Science, 2017, vol. 124, pp. 728–735.
P. Ning and A. N. Liu, “Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks,” ACM Trans. Sens. Networks, vol. 4, no. 1, pp. 1–35, 2008.
S. Hyun and P. Ning, “Seluge: Secure and dos-resistant code dissemination in wireless sensor networks,” in In Information Processing in Sensor Networks, 2008. IPSN’08., 2008, pp. 445–456.
R. Zhang, J. Zhang, Y. Zhang, J. Sun, and G. Yan, “Privacy-preserving profile matching for proximity-based mobile social networking,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 656–668, 2013.
T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, “DTLS based security and two-way authentication for the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2710–2723, 2013.
X. Du and H. Chen, “Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks,” in 2008 IEEE International Conference on Communications, 2008, pp. 1653–1657.
Q. Dong, D. Liu, and P. Ning, “Providing DoS resistance for signature-based broadcast authentication in sensor networks,” ACM Trans. Embed. Comput. Syst., vol. 12, no. 3, pp. 1–26, 2013.
H. Tan, D. Ostry, J. Zic, and S. Jha, “A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks,” Comput. Secur., vol. 32, pp. 36–55, 2013.
D. He, S. Chan, and M. Guizani, “Cyber Security Analysis and Protection of Wireless sensor Networks for Smart Grid Monitoring,” IEEE Wirel. Commun., vol. PP, no. 99, pp. 2–7, 2017.
T. Aura, P. Nikander, and J. Leiwo, “DOS-resistant authentication with client puzzles,” in In International workshop on security protocols, 2000, pp. 170–177.
P. Chuchaisri and R. Newman, “Fast response PKC-based broadcast authentication in wireless sensor networks,” Mob. Networks Appl., vol. 17, no. 4, pp. 508–525, 2012.
D. Kim, S. Member, and S. An, “PKC-based DoS Attacks-Resistant Scheme in Wireless Sensor Networks,” IEEE Sens. J., vol. 16, no. 8, pp. 2217–2218, 2016.
F. Afianti, Wirawan, and T. Suryani, “Filtering methods for broadcast authentication against PKC-based denial of service in WSN: a survey,” in Fifth International Conference on Wireless and Optical Communications, 2017, vol. 10465, p. 1046503.
A. Liu and P. Ning, “TinyECC : A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” in Proceedings of the 7th international conference on Information processing in sensor networks, 2008, pp. 245–256.
G. De Meulenaer, F. Gosset, F. X. Standaert, and O. Pereira, “On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks,” in WIMOB’08 IEEE International Conference on Wireless and Mobile Computing, 2008, pp. 580–585.
M. Sethi, J. Arkko, and A. Keranen, “End-to-end Security for Sleepy Smart Object Networks,” in IEEE 37th Conference onLocal Computer Networks Workshops (LCN Workshops), 2012, pp. 964–972.
A. Xu, M. Li, J. Cai, N. Xue, J. Zhang, D. Liu, P. Craig, and X. Huang, “Improving Efficiency of Authenticated OpenFlow Handshake using Coprocessors,” in IEEE 8th International Conference on Information Technology in Medicine and Education (ITME), 2016, pp. 576–580.
D. Johnson, A. Menezes, and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Int. J. Inf. Secur., vol. 1, no. 1, pp. 36–63, 2001.
X. Cao, W. Kou, L. Dang, and B. Zhao, “IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks,” Comput. Commun., vol. 31, no. 4, pp. 659–667, 2008.
Y. Liu, J. Li, and M. Guizani, “PKC based broadcast authentication using signature amortization for WSNs,” IEEE Trans. Wirel. Commun., vol. 11, no. 6, pp. 2106–2115, 2012.
A. C. Cameron and A. G. F. Windmeijer, “An R-squared measure of goodness of fit for some common nonlinear regression models,” J. Econom., vol. 77, no. i, pp. 329–342, 1997.
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmission of IPv6 Packets over IEEE 802.15.4 Networks,” No. RFC 4944, 2007.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development