WSN node access authentication protocol based on trusted computing

Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architect...

Full description

Saved in:
Bibliographic Details
Published in:Simulation modelling practice and theory Vol. 117; p. 102522
Main Authors: Liu, Jing, Liu, Lihui, Liu, Zenghui, Lai, Yingxu, Qin, Hua, Luo, Shiyao
Format: Journal Article
Language:English
Published: Elsevier B.V 01.05.2022
Subjects:
ISSN:1569-190X, 1878-1462
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first