Login / Signup

Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study.

Mario BarbareschiSalvatore BaroneAlfonso FezzaErasmo La Montagna
Published in: QUATIC (2021)
Keyphrases
  • wireless sensor networks
  • mutual authentication
  • security analysis
  • sensor networks
  • base station
  • resource constrained
  • sensor nodes
  • privacy protection
  • energy consumption
  • multi hop
  • data collection
  • security properties