Abstract
In this paper, we enhance our untraceable mobile sensor node protocol (Han K, Kim K, Shon T (2010) Sensors 10(5):4410–4429) that reduce computation overhead, and also satisfies practical security strength.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Han K, Kim K, Shon T (2010) Untraceable mobile node authentication in WSN. Sensors 10(5):4410–4429
Ibriq J, Mahgoub I (2007) A hierarchical key establishment scheme for wireless sensor networks. In: Proceedings of 21st international conference on advanced networking and applications (AINA’07), pp 210–219
Zhu S, Setia S, Jajodia S (2006) LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sen Netw 2:500–528
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Han, K., Shon, T. (2011). Enhancing Performance of Mobile Node Authentication with Practical Security. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_14
Download citation
DOI: https://doi.org/10.1007/978-94-007-2598-0_14
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2597-3
Online ISBN: 978-94-007-2598-0
eBook Packages: EngineeringEngineering (R0)