WSN node access authentication protocol based on trusted computing
Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architect...
Saved in:
| Published in: | Simulation modelling practice and theory Vol. 117; p. 102522 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.05.2022
|
| Subjects: | |
| ISSN: | 1569-190X, 1878-1462 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!