Amira Mnif - Profile on Academia.edu (original) (raw)

iir publications related author profile picture

Ismail Butun related author profile picture

psuresh kumar related author profile picture

Mika Ylianttila related author profile picture

Bo Sun related author profile picture

Abdul Qadeer related author profile picture

Muhammad Asad related author profile picture

Engineering Journal  Publication of Research work related author profile picture

Ruhul Amin related author profile picture

Muhammad Bilal related author profile picture

Uploads

Papers by Amira Mnif

Research paper thumbnail of An ID-based User Authentication Scheme for Wireless Sensor Networks using ECC

— The explosive growth in the use of mobile and wireless devices demands a new generation of remo... more — The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that's provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN.

Research paper thumbnail of An ID-based User Authentication Scheme for Wireless Sensor Networks using ECC

— The explosive growth in the use of mobile and wireless devices demands a new generation of remo... more — The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that's provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN.

Log In