Compromised Node Identification for Message Authentication in WSNs

Download Now
Provided by: Creative Commons
Topic: Enterprise Software
Format: PDF
Communication authentication is among the most beneficial methods to ward off unauthorized in addition to harmful announcements by becoming forwarded in Wireless Sensor Networks (WSNs). For this reason, many communication authentication strategies happen to be produced, based on either symmetric-key cryptosystems or maybe public-key cryptosystems. Many, even so, possess the constraints of higher computational in addition to verbal exchanges expense as well as lack of scalability in addition to resilience to node bargain episodes. To deal with these kinds of problems, the polynomial-based structure has been lately launched.
Download Now

Find By Topic