Open Access
Issue
ITM Web Conf.
Volume 79, 2025
International Conference on Knowledge Engineering and Information Systems (KEIS-2025)
Article Number 01015
Number of page(s) 7
DOI https://doi.org/10.1051/itmconf/20257901015
Published online 08 October 2025
  1. T. Kalidoss, L. Rajasekaran, K. Kanagasabai, G. Sannasi, A. Kannan, QoS aware trust-based routing algorithm for wireless sensor networks. Wirel. Pers. Commun. 110, 1637–1658 (2020). https://doi.org/10.1007/s11277-019-06788-y [Google Scholar]
  2. R.F. Liao, H. Wen, J. Wu, F. Pan, A. Xu, Y. Jiang, F. Xie, M. Cao, Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sens. 19, 2440 (2019). https://doi.org/10.3390/s19112440 [Google Scholar]
  3. N. Gao, Q. Ni, D. Feng, X. Jing, Y. Cao, Physical layer authentication under intelligent spoofing in wireless sensor networks. Signal Process. 166, 107272 (2020). https://doi.org/10.1016/j.sigpro.2019.107272 [Google Scholar]
  4. Sharmila, P. Kumar, S. Bhushan, M. Kumar, M. Alazab, Secure key management and mutual authentication protocol for wireless sensor network by linking edge devices using a hybrid approach. Wirel. Pers. Commun. 130, 2935–2957 (2023). https://doi.org/10.1007/s11277-023-10410-7 [Google Scholar]
  5. S.A. Althubiti, A trust-aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks. Math. Probl. Eng. 2022, 7842287 (2022). https://doi.org/10.1155/2022/7842287 [Google Scholar]
  6. K. Renuka, S. Kumar, S. Kumari, C.M. Chen, Cryptanalysis and improvement of a privacypreserving three-factor authentication protocol for wireless sensor networks. Sens. 19, 4625 (2019). https://doi.org/10.3390/s19214625 [Google Scholar]
  7. D.K. Kwon, S.J. Yu, J.Y. Lee, S.H. Son, Y.H. Park, WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sens. 21, 936 (2021). https://doi.org/10.3390/s21030936 [Google Scholar]
  8. X. Zhao, D. Li, A lightweight user authentication scheme for multi-gateway-based wireless sensor networks using Rabin cryptosystem. IEEE Access 11, 79874–79889 (2023). https://doi.org/10.1109/ACCESS.2023.3300440 [Google Scholar]
  9. S.K. Erskine, Secure data aggregation using authentication and authorization for privacy preservation in wireless sensor networks. Sens. 24, 2090 (2024). https://doi.org/10.3390/s24072090 [Google Scholar]
  10. Y. Zheng, W. Liu, C.H. Chang, A lightweight PUF- based secure group key agreement protocol for wireless sensor networks. in IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, Monterey, CA, USA, July (2023), 1–5 [Google Scholar]
  11. J. Zhang, Network security situational awareness based on genetic algorithm in wireless sensor networks. J. Sens. 2022, 8292920 (2022). https://doi.org/10.1155/2023/8292920 [Google Scholar]
  12. P. Phalaagae, A.M. Zungeru, B. Sigweni, S. Rajalakshmi, H. Batte, O.S. Eyobu, An energyefficient authentication scheme for cluster-based wireless IoT sensor networks. Sci. Afr. 25, e02287 (2024). https://doi.org/10.1016/j.sciaf.2024.e02287 [Google Scholar]
  13. J. Mo, Z. Hu, W. Shen, A provably secure three- factor authentication protocol based on Chebyshev chaotic mapping for wireless sensor networks. IEEE Access 10, 12137–12152 (2022). https://doi.org/10.1109/ACCESS.2022.3146393 [Google Scholar]
  14. R. Ahmad, R. Wazirali, T. Abu-Ain, Machine learning for wireless sensor networks security: An overview of challenges and issues. Sens. 22, 4730 (2022). https://doi.org/10.3390/s22134730 [Google Scholar]
  15. K.S. Sai, R. Bhat, M. Hegde, J. Andrew, A lightweight authentication framework for fault- tolerant distributed WSN. IEEE Access 11, 8336483376 (2023). https://doi.org/10.1109/ACCESS.2023.3302251 [Google Scholar]
  16. S.X. Pushpa, S.K. Raja, Enhanced ECC-based authentication protocol in a wireless sensor network with DoS mitigation. Cybern. Syst. 53, 734–755 (2022). https://doi.org/10.1080/01969722.2022.2055403 [Google Scholar]
  17. J. Mo, Z. Zhang, Y. Lin, A practically secure two- factor and mutual authentication protocol for distributed wireless sensor networks using PUF. Electron. 14, 10 (2024). https://doi.org/10.3390/electronics14010010 [Google Scholar]
  18. P. Alimoradi, A. Barati, H. Barati, A hierarchical key management and authentication method for wireless sensor networks. Int. J. Commun. Syst. 35, e5076 (2022). https://doi.org/10.1002/dac.5076 [Google Scholar]
  19. W. Yu, L. Yang, S. Wang, New lattice-based broadcast authentication protocol for wireless sensor networks. Secur. Commun. Netw. 2022, 6809875 (2022). https://doi.org/10.1155/2022/6809875 [Google Scholar]
  20. H. Feng, B. Cai, A provably secure and lightweight two-factor authentication protocol for wireless sensor network. Electron. 13, 4289 (2024). https://doi.org/10.3390/electronics13214289 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.