搜索结果: 1-15 共查到“军事学 wireless”相关记录40条 . 查询时间(0.02 秒)
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
Exploiting Unreliability of the PUF to Secure Remote Wireless Sensing
remote sensing hardware security physical unclonable function
2016/1/26
Wireless sensors attracts increasingly attention from both academia and industry owing
to emerging applications built upon them such as Internet of Things, smart home, E-Health, and
etc. It becomes ...
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Hybrid Anomaly Misdirection Blackhole
2016/1/7
Security is the biggest concern in Wireless Sensor Networks (WSNs)
especially for the ones which are deployed for military applications and
monitoring. They are prone to various attacks which degrad...
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Stream cipher encryption FSR
2016/1/3
The demand for more efficient ciphers is a likely to sharpen
with new generation of products and applications. Previous cipher designs
typically focused on optimizing only one of the two parameters
...
Pairing Based Mutual Healing in Wireless Sensor Networks
Wireless sensor networks Mutual healing Bi-linear Pairing
2015/12/30
In Wireless Sensor Networks(WSNs), a group of users communicating on an unreliable wireless channel can use a group secret. For each session, group manager broadcasts a message containing some keying ...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
The Energy Budget for Wireless Security: Extended Version
Wireless Security RFID Authentication
2015/12/22
Due to the numerous security and privacy risks, applications deployed in wireless
networks require strong cryptographic protection. Reducing the energy cost of cryptographic
algorithms and protocols...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
secret-key cryptography
2014/3/12
For security applications in wireless sensor networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small memory requirements is a real challenge because the sensor networks mu...
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
cryptographic protocols / Wireless sensor networks key management key predistribution expander graphs
2012/3/23
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications
Authenticated key agreement Off-line password guessing attack
2011/7/25
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
authentication security elliptic curve cryptosystem wireless sensor network
2011/6/9
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
2012/3/28
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...