Clutter-sensitive data association for simultaneous localization and mapping in robotic wireless sensor networks

Author(s):  
Rex Wong ◽  
Jizhong Xiao ◽  
Samleo L. Joseph
2018 ◽  
Vol 75-76 ◽  
pp. 19-32 ◽  
Author(s):  
Changhyuk An ◽  
Youngwon Kim An ◽  
Seong-Moo Yoo ◽  
B. Earl Wells

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


Sign in / Sign up

Export Citation Format

Share Document