Authors
D Boyle, T Newe
Publication date
2007/3/4
Conference
2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)
Pages
54-54
Publisher
IEEE
Description
Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies …
Total citations
2007200820092010201120122013201420152016201720182019202020212022202315669858144443311
Scholar articles