Authentication Protocols for WSN using ECC and Hidden Generator

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Protocols for WSN using ECC and Hidden Generator

Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security c...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Multi Factor Authentication Protocols for a Secured Wsn

WSN is an embedded system with the network properties of self configuration, self healing, dynamic routing and multi hop communication and sensor nodes are scattered in sensor field. WSN is ubiquitous in nature but nodes have limited energy resources and memory constraints, the protocols designed for sensor networks should be energy efficient. Security access to the sensor networks is a critica...

متن کامل

Authentication System Securing Index of Image using SVD and ECC

Abstract This paper presents a new approach to securing information stored in a database. It has three components including: an operation for indexing images using Singular Value Decomposition (SVD), which will constitute the reference images, asymmetric encryption operation using Elliptic Curve Cryptosystem (ECC), aiming to make confidential these reference images stored and a technique for co...

متن کامل

Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC-based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities and to enhance them to be more secure against threats. This work demonstrates how currently-used ECC-based protocols are vulnerable to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016908175