Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 9297562, 7 pages
http://dx.doi.org/10.1155/2016/9297562
Research Article

Study of Wireless Authentication Center with Mixed Encryption in WSN

School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510000, China

Received 25 March 2016; Accepted 29 May 2016

Academic Editor: Iftikhar Ahmad

Copyright © 2016 Yiqin Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Sabbah, A. Majeed, K.-D. Kang, K. Liu, and N. Abu-Ghazaleh, “An application-driven perspective on wireless sensor network security,” in Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (Q2SWinet '06), pp. 1–8, ACM, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. X.-Y. Yang, Q. Zhang, and L.-X. Wei, “A robust entity authentication in wireless sensor networks,” in Proceedings of the International Conference on Information Engineering and Computer Science, pp. 1–4, IEEE, Wuhan, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Watro, D. Kong, S.-F. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 59–64, ACM Press, Washington, DC, USA, October 2004. View at Scopus
  4. H. Lee, K. Lee, and Y. Shin, “Implementation and performance analysis of AES-128 CBC algorithm in WSNs,” in Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT '10), pp. 243–248, IEEE Press, 2010.
  5. K. Bauer and H. Lee, “A distributed authentication scheme for a wireless sensing system,” ACM Transactions on Information and System Security, vol. 11, no. 3, pp. 1–35, 2008. View at Google Scholar
  6. R. Bellazreg, N. Boudriga, and M. Hamdi, “A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks,” in Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1077–1082, IEEE, Liverpool, UK, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik, “Collaborative authentication in unattended WSNs,” in Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09), pp. 237–244, Zurich, Switzerland, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. K. Han, K. Kim, and T. Shon, “Untraceable mobile node authentication in WSN,” Sensors, vol. 10, no. 5, pp. 4410–4429, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Q. Zhao, Y. N. Weng, Y. Lu, and C. Y. Liu, “Research on dynamic routing mechanisms in wireless sensor networks,” The Scientific World Journal, vol. 2014, Article ID 165694, 7 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. Y.-Q. Lu, D.-W. Wu, and J.-C. Qin, “Wireless authentication center based on embedded Wi-Fi technology,” WIT Transactions on Information and Communication Technologies, vol. 59, pp. 387–394, 2014. View at Google Scholar
  11. Y.-Q. Lu, D.-W. Wu, and J.-C. Qin, “Design of embedded web server based on MCU and IPv6,” International Journal of Advancements in Computing Technology, vol. 5, no. 5, pp. 1232–1240, 2013. View at Google Scholar
  12. S. F. Mare, M. Vladutiu, and L. Prodan, “Secret data communication system using steganography, AES and RSA,” in Proceedings of the IEEE 17th International Symposium for Design and Technology of Electronics Packages (SIITME '11), pp. 339–344, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Eastlake III and P. Jones, US Secure Hash Algorithm 1 (SHA1), RFC Editor, 2001.
  14. A. Kakkar, M. L. Singh, and P. K. Bansal, “Comparison of various encryption algorithms and techniques for secured data communication in multinode network,” International Journal of Engineering and Technology, vol. 2, no. 1, pp. 87–92, 2012. View at Google Scholar
  15. W. Heng-Qing and S. Ru-Min, “The security of public key cryptosystem depends on the length of the key,” Scientific and Technological Information: Academic Research, vol. 34, 2008. View at Google Scholar
  16. C. You-ping, “Study on the coexistence of bluetooth and WiFi,” Science and Technology Wind, no. 8, p. 99, 2009. View at Google Scholar
  17. N. Hopper, L. von Ahn, and J. Langford, “Provably secure steganography,” IEEE Transactions on Computers, vol. 58, no. 5, pp. 662–676, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. J. Daemen and V. Rijmen, “The first 10 years of advanced encryption,” IEEE Security & Privacy, vol. 8, no. 6, pp. 72–74, 2010. View at Publisher · View at Google Scholar · View at Scopus