4.6 Article

A Lightweight Authentication MAC Protocol for CR-WSNs

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Employing machine learning based malicious signal detection for cognitive radio networks

Yasin Turkyilmaz et al.

Summary: In this article, a machine learning based malicious signal detection system is proposed for cognitive radio networks. The system utilizes fuzzy logic for the security categorization of spectrum sensing signals and is validated with the results obtained from a fuzzy logic based approach. The random forest method performs the best among all machine learning methods for signal detection.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Telecommunications

A New Energy-Aware Cluster Head Selection Algorithm for Wireless Sensor Networks

Muhammed Tay et al.

Summary: Wireless Sensor Networks (WSN) require efficient energy consumption for prolonged life, especially in areas where energy restoration is difficult. The proposed clustering algorithm C3HA provides a new perspective for CH selection, proving to be more efficient than popular algorithms like LEACH and PEGASIS in terms of fast and accurate CH selection.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Chemistry, Analytical

WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks

Deok Kyu Kwon et al.

Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.

SENSORS (2021)

Article Computer Science, Artificial Intelligence

A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT

Haqi Khalid et al.

Summary: An online/offline lightweight authentication scheme using AES-RSA algorithm is proposed to enhance the security and efficiency of VANET in IIoT, with offline joining added to avoid risks. The study employs BAN logic to prove mutual authentication and AVISPA tool to formally evaluate and verify system security. Results show the proposed scheme outperforms other schemes in computation and communication cost efficiency.

PEERJ COMPUTER SCIENCE (2021)

Article Telecommunications

A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things

Mohammad Nikravan et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Lightweight privacy preservation for secondary users in cognitive radio networks

Yali Zeng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

Patil Rachana Yogesh et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Article Computer Science, Information Systems

An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network

Mostafa Farhadi Moghadam et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks

Jiaqing Mo et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

Fan Wu et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2017)

Article Computer Science, Information Systems

A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks

Mahmoud Khasawneh et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Review Chemistry, Analytical

A Survey on Node Clustering in Cognitive Radio Wireless Sensor Networks

Gyanendra Prasad Joshi et al.

SENSORS (2016)

Article Computer Science, Information Systems

A Survey on MAC Strategies for Cognitive Radio Networks

Antonio De Domenico et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Hardware & Architecture

End-to-end protocols for Cognitive Radio Ad Hoc Networks: An evaluation study

Marco Di Felice et al.

PERFORMANCE EVALUATION (2011)

Article Engineering, Electrical & Electronic

HC-MAC: A hardware-constrained cognitive MAC for efficient spectrum management

Juncheng Jia et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2008)