A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks.
Sujun LiWeiping WangBoqing ZhouJianxin WangYun ChengJie WuPublished in: IEEE Wirel. Commun. Lett. (2018)
Keyphrases
- sensor nodes
- sensor networks
- authentication scheme
- secret key
- mobile sensor networks
- authentication protocol
- wireless sensor networks
- mobile wireless
- network connectivity
- base station
- smart card
- resource constrained
- sensor data
- mobile nodes
- data transmission
- energy efficient
- energy consumption
- data aggregation
- sink node
- user authentication
- mobile networks
- communication cost
- public key
- data streams
- key management
- wireless communication
- energy efficiency
- security analysis
- fault tolerant
- routing algorithm
- security protocols
- ciphertext
- routing protocol
- multi hop
- key distribution
- diffie hellman