Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/62032
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDelgado-Mohatar, Oscaren
dc.contributor.authorSierra, José Men
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorFúster-Sabater, Amparoen
local.source.editorEditor(s): Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis and Damien Sauveronen
dc.date.accessioned2024-08-08T03:59:51Z-
dc.date.available2024-08-08T03:59:51Z-
dc.date.issued2010-
dc.identifier.citation4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings, v.6033, p. 332-339en
dc.identifier.isbn978-3-642-12367-2en
dc.identifier.isbn978-3-642-12368-9en
dc.identifier.issn0302-9743en
dc.identifier.issn1611-3349en
dc.identifier.urihttps://hdl.handle.net/1959.11/62032-
dc.description.abstract<p>Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, it is important to ensure security and, taking into account limited resources available in wireless sensor networks, the use of symmetric cryptography is strongly recommended. In this paper we present a light-weight authentication model for wireless sensor networks composed of a key management and an authentication protocol. It is based on simple symmetric cryptographic primitives with very low computational requirements, and it achieves better results than other similar proposals in the literature. Compared to SPINS and BROSK protocols, our system can reduce energy consumption by up to 98% and 67% respectively. It also scales well with the size of the network, due to it only requiring one interchanged message, regardless of the total number of nodes in the network.</p>en
dc.languageenen
dc.publisherSpringeren
dc.relation.ispartof4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedingsen
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.titleAn Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networksen
dc.typeConference Publicationen
dc.relation.conferenceWISTP 2010: 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devicesen
dc.identifier.doi10.1007/978-3-642-12368-9_27en
local.contributor.firstnameOscaren
local.contributor.firstnameJosé Men
local.contributor.firstnameLjiljanaen
local.contributor.firstnameAmparoen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryE1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.date.conference12th to 14th of April, 2010en
local.conference.placePassau, Germanyen
local.publisher.placeUnited States of Americaen
local.format.startpage332en
local.format.endpage339en
local.series.number6033en
local.peerreviewedYesen
local.identifier.volume6033en
local.contributor.lastnameDelgado-Mohataren
local.contributor.lastnameSierraen
local.contributor.lastnameBrankovicen
local.contributor.lastnameFúster-Sabateren
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/62032en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleAn Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networksen
local.output.categorydescriptionE1 Refereed Scholarly Conference Publicationen
local.conference.detailsWISTP 2010: 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, Passau, Germany, 12th to 14th of April, 2010en
local.search.authorDelgado-Mohatar, Oscaren
local.search.authorSierra, José Men
local.search.authorBrankovic, Ljiljanaen
local.search.authorFúster-Sabater, Amparoen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2010en
local.subject.for2020460401 Cryptographyen
local.subject.for2020460407 System and network securityen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Conference Publication
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

SCOPUSTM   
Citations

5
checked on Oct 12, 2024
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.