Authentication and Centralized Control of Electrical Devices Using Zigbee Protocol
نویسندگان
چکیده
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولMutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices
Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication in wireless sensor network as limited resources (storage, time or power) on sensor nodes restrict the use of conventional security techniques. We can construct genus 2 HECC on 80-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA. This paper proposes a mutual authentication ...
متن کاملAn Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devic...
متن کاملAn Authentication Protocol for Mobilde Devices
Currently, most of e-commerce applications rely on asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper argues that the existing authentication protocols, based on asymmetric cryptography, are not appropriate for such devices due to their limit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Instrumentation Control and Automation
سال: 2011
ISSN: 2231-1890
DOI: 10.47893/ijica.2011.1037