Login / Signup
Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study.
Mario Barbareschi
Salvatore Barone
Alfonso Fezza
Erasmo La Montagna
Published in:
QUATIC (2021)
Keyphrases
</>
wireless sensor networks
mutual authentication
security analysis
sensor networks
base station
resource constrained
sensor nodes
privacy protection
energy consumption
multi hop
data collection
security properties