These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Lu Y; Li L; Peng H; Yang Y Sensors (Basel); 2016 Jun; 16(6):. PubMed ID: 27338382 [TBL] [Abstract][Full Text] [Related]
4. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge. Hung LX; Canh NT; Lee S; Lee YK; Lee H Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956 [TBL] [Abstract][Full Text] [Related]
5. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks. Lee TF Sensors (Basel); 2015 Jun; 15(7):14960-80. PubMed ID: 26121612 [TBL] [Abstract][Full Text] [Related]
6. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks. Jung J; Kim J; Choi Y; Won D Sensors (Basel); 2016 Aug; 16(8):. PubMed ID: 27537890 [TBL] [Abstract][Full Text] [Related]
7. Simulation of Attacks for Security in Wireless Sensor Network. Diaz A; Sanchez P Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710 [TBL] [Abstract][Full Text] [Related]
8. An Efficient Location Verification Scheme for Static Wireless Sensor Networks. Kim IH; Kim BS; Song J Sensors (Basel); 2017 Jan; 17(2):. PubMed ID: 28125007 [TBL] [Abstract][Full Text] [Related]
9. Sensor data security level estimation scheme for wireless sensor networks. Ramos A; Filho RH Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215 [TBL] [Abstract][Full Text] [Related]
10. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks. Jung J; Moon J; Lee D; Won D Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335572 [TBL] [Abstract][Full Text] [Related]
11. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572 [TBL] [Abstract][Full Text] [Related]
12. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack. Nirmal Raja K; Maraline Beno M J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503 [TBL] [Abstract][Full Text] [Related]
13. An Authentication Protocol for Future Sensor Networks. Bilal M; Kang SG Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28452937 [TBL] [Abstract][Full Text] [Related]
14. Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. Chen CT; Lee CC; Lin IC PLoS One; 2020; 15(4):e0232277. PubMed ID: 32353049 [TBL] [Abstract][Full Text] [Related]
15. A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks. Tien NX; Kim S; Rhee JM; Park SY Sensors (Basel); 2017 Jul; 17(8):. PubMed ID: 28757544 [TBL] [Abstract][Full Text] [Related]
16. A provably-secure ECC-based authentication scheme for wireless sensor networks. Nam J; Kim M; Paik J; Lee Y; Won D Sensors (Basel); 2014 Nov; 14(11):21023-44. PubMed ID: 25384009 [TBL] [Abstract][Full Text] [Related]
17. A wormhole attack detection method for tactical wireless sensor networks. Zhang K PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659 [TBL] [Abstract][Full Text] [Related]
18. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks. Cheng Y; Liu Y; Zhang Z; Li Y Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514753 [TBL] [Abstract][Full Text] [Related]