You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

1 December 2016

Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments

,
and
1
Department of Computer Science and Engineering, Soongsil University, Seoul 07027, Korea
2
Faculty of Computer Engineering, Keimyung University, Daegu 42601, Korea
3
Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 01811, Korea
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Topology Control in Emerging Sensor Networks

Abstract

The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

1. Introduction

The technological paradigm that seeks to converge people, devices, communications, and data has evolved through the Internet of Things (IoT), Wireless Sensor Networks (WSNs), Ubiquitous Sensor Networks (USNs), Machine to Machine (M2M), and the Internet of Everything (IoE), and has most recently been established as Cyber Physical Systems (CPSs) [1]. These technologies are generally referred to as the IoT, and they use wireless communications technology to connect people with devices and devices with each other to provide smart technologies and services [2].
The various devices in the IoT environment process significant information; the IoT environment can analyze various aspects of the environment, economy, or infrastructure, and allocate devises depending on these results. Allocated devices can sense and process simple environmental information (such as temperature and humidity) or personal information (such as an individual’s location). In the case of processing simple environmental information, service quality is often prioritized over security, for the sake of efficiency [3,4]. However, even if the device only processes environmental information, services that involve smart energy or smart vehicles can be closely related to public and personal security [5,6].
As such, IoT devices must have security technology applied while accounting for the damage that could result from an intrusion, the device’s hardware functionality, the environment and infrastructure, and the type and importance of the information being processed. Many factors must be considered in IoT security environments, not limited to the characteristics of device communication in which data are transmitted through nearby nodes, the anticipation that more than 18 billion such devices will be in use by the year 2018, the vulnerabilities of existing security algorithms, the limits of security functions as defined in standard documents, and known vulnerabilities of authentication algorithms [7,8,9]. Thus, this study considers energy efficiency to make the best use of limited resources and suggests a lightweight mutual verification and key exchange method based on a hash function that has no restrictions on operation quantity, velocity, and storage space [10].

3. Proposed Scheme

In the suggested method, while routing protocol motion is based on the LEACH routing protocol [37], a lightweight protocol for existing sensor network environments, it forms a group using energy information for greater efficiency. The suggested IoT environment has the following characteristics: every sensor node in the specific area can transmit to the sync node in one hop; sensors give the intensity of received power and changes in transmission power are possible; and sensor nodes regularly transmit data to the base station.
For the battery life, each sensor periodically selects a random Middle Node (MN) and forms a group through it. After the sensor nodes belonging to the specific group collect data to transmit to MN, MN aggregates this information and transmits it to MD. At this time, MN consumes relatively more energy compared to other nodes and may negatively influence the whole network if specific nodes become overloaded. Thus, after a specified time period, MN is selected in order to distribute its energy consumption by round.
At this time, to consider the energy efficiency of sensor nodes, nodes belonging to each group transmit their energy quantity and MN aggregates this information and transmits it to MD. MD selects the top 30% nodes that do not play a role in MN through a probability algorithm, as follows:
P i ( x ) = K o p t N K o p t ( r   m o d   N K o p t ) C i ( t ) = 0   o r   1
where i represents each sensor and has a value ranging from 1 to the total number of sensors, N; t is time; Pi(t) is the probability of selecting i as MN at t; r represents the round; Kopt is the number of rounds that ends at Group of Round; and Ci(t) represents either 0 or 1, according to whether it was selected as MN before t. One round is performed from when a new cluster is formed to when the new cluster is expired. When all nodes have each cluster head, the nodes can be eligible to become cluster heads, which state is defined as Group of Round. As the round progresses, since the number of sensors participating in MN selection decreases, the probability of becoming MN increases. At this point, the probability of becoming MN is Kopt.
The sensor that calculated Pi(t) will pick a p value between 0 and 1; if p < Pi(t), it selects itself as MN. If p > Pi(t), the node will be used for forming a cluster. If the current node became MN at Group-of-Round, Pi(t) = 0, so it is impossible to become MN until a new round begins. In the final round, Pi(t) = 1, so nodes that never have been MN are selected as MN. The parameters for the proposed protocol are described in Table 1.
Table 1. Proposed protocol parameters.

3.1. Initial Authentication Process

Figure 5 shows Initial Authentication Process and Smart Device Registration. The gateway that controls the home network of a specific area constantly sends advertisement messages. Smart nodes that are newly registered in the network system send join messages in response to these advertisement messages; the gateway verifies smart nodes through CA. When verification is completed, a smart device carries out mutual verification and key exchange as follows [38].
Step 1.
The smart node that received an advertisement message generates M0 and H0 for self-verification and sends them to the gateway.
Step 2.
The gateway that received M0 and H0 generates M1 and H1 and sends them to the CA manufacturer.
Step 3.
The CA that received information from the gateway obtains two random numbers through decoding and verifies H0 and H1 through searched PW. It generates M2 and M3 and sends them to the gateway.
Step 4.
The gateway that received M2 and M2 gains R1 from decoding M3 and checks for any error in the received value through a hash function. It saves 3 × n-bit information generated by two random numbers for verification and then sends M2 to the smart node.
Step 5.
The smart node that received M2 gains R2 and verifies the sent value through a hash function. If the verification is finished, the node saves 3 × n-bit information, as above.
Step 6.
The smart node generates random number C1 to perform the verification step and sends it by bit. At this point, the time check for preventing relay attacks begins.
Step 7.
The gateway that received bits from the smart node sends the ith bit of R0 if C1 = 0 in response, and sends the ith bit of R1 to the smart node if the response is 1.
Step 8.
The smart node generates Ricn based on the c sent to the gateway and compares it to Ricn, which is the gathered value of the cluster head’s response to verify whether the data was sent from the correct node. After “time off,” it guesses the distance through time measurement and stops communication if this is greater than a specified time.
Step 9.
The smart node that verified the gateway sends the received Ricn values using the f() function to the gateway.
Step 10.
The smart node that received a certification value from the gateway generates a certification value in same way and compares it to the value received from the cluster head to verify the smart node.
Step 11.
The smart node and the gateway generate a session key using the left n bit and a random number from the 3 × n-bits and ends the verification.
Figure 5. Initial authentication and device registration process.

3.2. Smart Device Registration

Step 1.
A user who tries to control the smart node through a smart device generates a random number and M4 and Hs, and then sends M4, IDsd, Hs, and TS to the gateway.
Step 2.
The gateway that received this decodes M4 and verifies Hs. After that, it searches the session key with the smart nodes and sends the encrypted Rs and IDs.
Step 3.
The smart node generates session keys through Rs; after it generates R3, it sends the encrypted session key with the gateway. The gateway sends them through the key with the smart node after decoding.
Step 4.
The smart device generates a session key with two random numbers and ends the procedure after verifying them through the certification value that uses the smart node and serial number.

3.3. Smart Device Key Updating Process

Step 1.
After completing certification sensor group formation and session key distribution, the sensor node carries out the group key distribution and renewal process as follows. Using the polynomial distribution of PCGR, it makes MN do most of the calculation, distributes pieces of the specific value through the f(y) function, and verifies whether the node is contaminated or needs to be withdrawn.
Step 2.
The group’s representative node, MN, defines and generates polynomials g(x) and f(y) for group distribution and node verification. After that, it generates verification values S and Dn. Next, it generates P1 for transmitting to nodes and deletes g(x) and e(x) to prevent them from being exposed by an attacker.
Step 3.
The sensor node that received P1 decodes this, and obtains the group key and secret piece. It then informs MN that the group key was successfully received.
Step 4.
After a certain period of time, MN transmits a message for updating the group key to the nodes within the group. Nodes that receive the key-update message send MN an encrypted secret piece with the session key in response, and MN checks the validity of the received value through a Lagrangian polynomial and sends a “success” message. If the value differs, it informs specific nodes of contamination.
Step 5.
Nodes that received the message from MN send nodes around Pn for updating the key through Equation (2):
g ( c ) = g ( c ) + e u ( c ,   N id )
Step 6.
After the key is updated, it finishes the verification process with nodes through the group key. The whole process of Smart Device Key Updating is shown in Figure 6.
Figure 6. Group key updating process.

4. Performance Evaluation

4.1. Securiy Analysis

4.1.1. Mutual Authentication

This paper uses random numbers generated by the smart nodes and gateways when bits are exchanged to generate Ri°, Ri° and Ri°, Ri°, which are promised as responses to the random value c, making mutual authentication possible. In addition, for the registration of smart devices, authentication is possible through the authenticated gateway.

4.1.2. Replay and Relay Attacks

This is a method of attack in which a message is stolen by an unauthenticated attacker while the message is sent to each node. When the message is reused, a newly generated session key and not the session key that occurred during the steal, sk = Ri°n1 and f(Rs1, Rs2), is used. This makes it secure against attacks where previous messages are reused. For each message, time stamps are generally applied. Verification is possible through the completion of the message time. Through the bit exchange process, it can be judged whether each node is physically close, making it secure against relay attacks.

4.1.3. Message Manipulation Attacks

This is an attack in which an unauthenticated attacker steals the message transmitted to each node and makes it a counterfeit message to meet the goal of the attacker. In this case, too, a newly generated session key and not the session key that had been generated at the time the message was sent, sk = Ri°n1 and f(Rs1, Rs2), is used. This makes it secure against counterfeit message attacks.

4.1.4. Snooping

This is an attack method in which the transmitted message is snooped. Since it uses f(Rs1, Rs2) between the smart device and smart node, which is constantly updated, even if message snooping is attempted, only the encrypted phrase can be seen.

4.1.5. Spoofing

This is an attack in which network identification information is changed to deceive another party using previously authenticated nodes. Even if there is a spoofing attack, a session cannot be established through a third party, making the network secure against such attacks.

4.1.6. Side Channel Attack

This is an attack in which side elements such as processing time, energy usage, or electronic waves are used. Regardless of the length of the data transmitted, the same size message is sent, making it secure against side channel attacks.

4.1.7. Forward Security and Error Detection

The sensor nodes MN and GW know where the bit that is generated through the bit stream calculation is located among the transmitted 2 bits. Through this, even if one bit is incorrectly located, error detection is possible and forward security can be achieved.

4.2. Overhead Analysys

Blundo’s protocol, which is the sensing security technique in existing sensor networks, differs depending on the number of nodes in the network; if the number of nodes is N, polynomial expression with (N − 1) variables of degree t are calculated. Each sensor node should save the polynomial expression of length N(t + 1)L in the server, requiring N messages. That is, Blundo’s Protocol can be secured unless t members are attacked, but it can overload the network, as each node performs significant calculation for an IoT environment in which numerous sensors exist. Blundo’s protocol provides good security when the number of damaged nodes is less than λ; if the number of damaged nodes is greater than λ, all secure information is exposed to danger. In the case of the PCGR technique, information to be saved and calculations required vary depending on the surrounding nodes generated the group key. Assuming that the number of surrounding nodes is n and the probability that the surrounding nodes generate the group key is Pro(d), it has a polynomial expression of the group key encrypted with (t + 1)L-bit length and bit information of n(t + 1)L, which is partial information of the surrounding nodes. In addition, for the message, aside from n messages, Pro(d) × n2 additional messages are needed. That is, for PCGR, if the cluster header, which distributes the group key within the group, is increased, energy consumption increases drastically. The more the nodes within the group increase, the more the average energy consumption is increased as well. In the suggested scheme, through the exchange in small bit units and hash function-based operation, few calculations are required within the group.

4.3. Analysis of Energy Eefficiency

The following simulation was performed using the MATLAB program in order to analyze the efficiency through the measurement of time efficiency for each IoT device for proposed protocol and the previous encryption technology.
Table 2 is the initial setting value for performing the simulation and the time for simulation was set considering the amount of node energy. For simulation, the time efficiency was measured according to the increase in IoT devices by setting a total of 10~200 nodes, and the test was performed by configuring an independent environment for each encryption technology and the proposed scheme.
Table 2. Initial simulation setup table.
The sensor nodes were distributed randomly in a 20 m × 20 m area regardless of the number of nodes. The gate was assigned in a specific position considering the placement area.
According to the placement, the distance between all sensor nodes and gateway remained between 25 m and 10 m. Each round was set to last for 20 s.
Figure 7 and Figure 8 show the simulation result after the environment was configured as shown in Table 2. Simulation results have shown that in the case of the proposed scheme, the operation being performed in the device was relying on simple hash operation and arithmetic operation with less operation consumption time compared to other authentication techniques.
Figure 7. Analysis of authentication time—client.
Figure 8. Analysis of authentication time—server.
In addition, in the case of group key distribution and renewal process, all polynomial operation was performed by the server, thereby reducing the burden of the device and providing a lightweight characteristic compared to other authentication techniques.

5. Conclusions

The proposed scheme uses simple hash calculations to support devices with hardware limitations, and suggested certification protocols to focus on specific nodes for complex calculations. We consider a routing protocol plan in existing sensor network environments for the commercialization of certification protocols that was designed to accept super-lightweight devices that cannot equip encrypted modules in a heterogeneous IoT environment, a limitation of existing IoT environments.
Recently, research related to efficient lightweight certification and key management approaches such as Danyang’s Protocol [39] and Thaier’s approach [40] has been introduced. However, given that WSN environments are extended to the concepts of the IoT, there is a limitation in that the security requirements and environmental elements defined in IoT standards are not satisfied. The proposed scheme designs the protocols considering not only the environmental elements of OneM2M but also the environmental elements of smart dust where the smart dust is expected to be one of the major technologies.
We confirmed through performance analysis that our certification framework is more lightweight than renowned security certification techniques, and largely improved in security and energy efficiency with less energy consumption compared to existing certification techniques. Security comparison analysis shows that the method meets every security requirement defined by the OneM2M standard. Thus, as the lightweight certification and key management scheme in the suggested IoT environments meets the OneM2M international security standards, we confirm that it is superior to existing security techniques.
Due to the hardware limitations of subminiature devices, continuous group renewal may efficiently deal with addition and withdrawal of new nodes. As its security was verified, the proposed method is applicable for various environments in which a variety of devices, including simple subminiature sensors, are used; it is also expected to be practical for IoT environments.

Acknowledgments

This research was supported by the Bisa Research Grant of Keimyung University in 2016.

Author Contributions

Jaeseung Lee: Research for the related works, drafting the article, and acquisition of data. Yunsick Sung: Research for analyzing the proposed model, analyzing the experiments and reviewing the proposed model. Jong Hyuk Park: Research for analyzing the proposed model, analyzing the experiments and hrevising the proposed model.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
WSNWireless Sensor Network
USNUbiquitous Sensor Network
M2MMachine to Machine
IoEInternet of Everything
CPSCyber Physical Systems
LWIGLight-Weight Implementation Guidance
IETFInternet Engineering Task Force
LLNLow Power Lossy Network
CoAPConstrained Application Protocol
DTLSDatagram Transport Layer Security
ECCElliptic Curve Cryptosystem
ECMElliptic Curve Method

References

  1. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
  2. Jun, Z.; Simplot-Ryl, D.; Bisdikian, C.; Mouftah, H.T. The internet of things. IEEE Commun. Mag. 2011, 49, 30–31. [Google Scholar]
  3. Qian, Z.; Wang, Y. IoT technology and application. Acta Electron. Sin. 2012, 40, 1023–1028. [Google Scholar]
  4. Peng, K. A secure network for mobile wireless service. J. Inf. Process. Syst. 2013, 9, 247–258. [Google Scholar] [CrossRef]
  5. Kim, H.W.; Kim, D.K. IoT technology and security. Korea Inst. Inf. Secur. Cryptol. 2012, 22, 7–13. [Google Scholar]
  6. Chang, C.C.; Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357–366. [Google Scholar] [CrossRef]
  7. Bayram, I.S.; Papapanagiotou, I. A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 223. [Google Scholar] [CrossRef]
  8. Cheng, H.; Su, Z.; Xiong, N.; Xiao, Y. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf. Sci. 2016, 329, 461–477. [Google Scholar] [CrossRef]
  9. Zhang, H.; Zhu, L. Internet of Things: Key technology, architecture and challenging problems. In Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Shanghai, China, 10–12 June 2011; Volume 4, pp. 507–512.
  10. Ko, J.; Hong, S.; Lee, B.B.; Kim, N.S. Trends of converging smart devices with IoT technology. Electron. Telecommun. Trends 2013, 28, 79–85. [Google Scholar]
  11. Ishaq, I.; Carels, D.; Teklemariam, G.K.; Hoebeke, J.; Abeele, F.V.D.; Poorter, E.D.; Demeester, P. IETF standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2013, 2, 235–287. [Google Scholar] [CrossRef]
  12. Molisch, A.F.; Balakrishnan, K.; Chong, C.C.; Emami, S.; Fort, A.; Karedal, J.; Siwiak, K. IEEE 802.15. 4a Channel Model-Final Report. Available online: http://www.ieee802.org/15/pub/04/15-04-0662-02-004a-channel-model-final-report-r1.pdf (accessed on 1 September 2016).
  13. Bormann, C.; Castellani, A.P.; Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62. [Google Scholar] [CrossRef]
  14. Kovatsch, M.; Duquennoy, S.; Dunkels, A. A low-power CoAP for Contiki. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17–22 October 2011; pp. 855–860.
  15. Raza, S.; Trabalza, D.; Voigt, T. 6LoWPAN compressed DTLS for CoAP. In Proceedings of the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, Hangzhou, China, 18–20 May 2012; pp. 287–289.
  16. Kothmayr, T.; Schmitt, C.; Hu, W.; Brünig, M.; Carle, G. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), Clearwater, FL, USA, 22–25 October 2012; pp. 956–963.
  17. Bandyopadhyay, S.; Bhattacharyya, A. Lightweight Internet protocols for web enablement of sensors using constrained gateway devices. In Proceedings of the IEEE 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 334–340.
  18. Kahn, J.M.; Katz, R.H.; Pister, K.S. Next century challenges: Mobile networking for “Smart Dust”. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, WA, USA, 15–19 August 1999; pp. 271–278.
  19. Vermesan, O.; Friess, P. Internet of Things-Global Technological and Societal Trends from Smart Environments and Spaces to Green ICT; River Publishers: Delft, The Netherlands, 2011. [Google Scholar]
  20. Warneke, B.; Last, M.; Liebowitz, B.; Pister, K.S. Smart dust: Communicating with a cubic-millimeter computer. Computer 2011, 34, 44–51. [Google Scholar] [CrossRef]
  21. Madakam, S. Internet of Things: Smart Things. Int. J. Future Comput. Commun. 2015, 4, 250. [Google Scholar] [CrossRef]
  22. Chi, Q.; Yan, H.; Zhang, C.; Pang, Z.; Da Xu, L. A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans. Ind. Inf. 2014, 10, 1417–1425. [Google Scholar]
  23. Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Sensing as a service model for smart cities supported by internet of things. Trans. Emerg. Telecommun. Technol. 2014, 25, 81–93. [Google Scholar] [CrossRef]
  24. Blundo, C.; De Santis, A.; Herzberg, A.; Kutten, S.; Vaccaro, U.; Yung, M. Perfectly secure key distribution for dynamic conferences. Inf. Comput. 1998, 146, 1–23. [Google Scholar] [CrossRef]
  25. Blom, R. An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1984; pp. 335–338. [Google Scholar]
  26. Zhang, W.; Zhu, S.; Cao, G. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Netw. 2009, 7, 1229–1242. [Google Scholar] [CrossRef]
  27. Huang, J.H.; Buckingham, J.; Han, R. A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Berlin, Germany, 30 May–1 June 2005; pp. 249–260.
  28. Barrett, P. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1986; pp. 311–323. [Google Scholar]
  29. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  30. Liang, X.Q.; Da Xing, L.I. Elliptic Curve Cryptosystems. Available online: http://en.cnki.com.cn/Article_en/CJFDTOTAL-JFYZ199911000.htm (accessed on 1 September 2016).
  31. Saeki, M. Elliptic Curve Cryptosystems. Ph.D. Thesis, McGill University, Montreal, QC, Canada, 1997. [Google Scholar]
  32. Neuman, B.C.; Ts’o, T. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 1994, 32, 33–38. [Google Scholar] [CrossRef]
  33. Downnard, I. Public-key cryptography extensions into Kerberos. IEEE Potentials 2002, 21, 30–34. [Google Scholar] [CrossRef]
  34. Elgamal, T.; Hickman, K.E. Secure Socket Layer Application Program Apparatus and Method. U.S. Patent 5,657,390, 12 August 1997. [Google Scholar]
  35. Boneh, D. The decision diffie-hellman problem. In International Algorithmic Number Theory Symposium; Springer: Berlin/Heidelberg, Germany, 1998; pp. 48–63. [Google Scholar]
  36. Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 1996; pp. 104–113. [Google Scholar]
  37. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000.
  38. Lee, J.S.; Lee, A.; Jun, M.S. Sensor Authentication and Key Exchange Protocol for Energy Efficiency in Sensor Network Environment. In Proceedings of the 2016 World Congress on Information Technology Applications and Services, Jeju, Korea, 17 February 2016.
  39. Qin, D.; Jia, S.; Yang, S.; Wang, E.; Ding, Q. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks. J. Sens. 2016. [Google Scholar] [CrossRef]
  40. Hayajneh, T.; Mohd, B.J.; Imran, M.; Almashaqbeh, G.; Vasilakos, A.V. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 2016, 16, 424. [Google Scholar] [CrossRef] [PubMed]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.