Comprehensive Analysis of Broadcast Authentication protocols in Wireless Sensor Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Comprehensive Taxonomy of Intelligent-Based Routing Protocols in Wireless Sensor Networks

Routing in ad-hoc networks, specifically intelligent-based ones, is a highly interested research topic in recent years. Most of them are simulation-based study. Large percentages have not even mentioned some of the fundamental parameters. This strictly reduces their validity and reliability. On the other hand, there is not a comprehensive framework to classify routing algorithms in wireless sen...

متن کامل

Broadcast protocols for wireless sensor networks

Future network is all about an integrated global network based on an open-systems approach. Integrating different types of wireless networks with wireline backbone networks seamlessly and the convergence of voice, multimedia, and data traffic over a single IP-based core network will be the main focus of 4G. With the availability of ultrahigh bandwidth of up to 100 Mbps, multimedia services can ...

متن کامل

a novel comprehensive taxonomy of intelligent-based routing protocols in wireless sensor networks

routing in ad-hoc networks, specifically intelligent-based ones, is a highly interested research topic in recent years. most of them are simulation-based study. large percentages have not even mentioned some of the fundamental parameters. this strictly reduces their validity and reliability. on the other hand, there is not a comprehensive framework to classify routing algorithms in wireless sen...

متن کامل

Effective Multi-user Broadcast Authentication in Wireless Sensor Networks

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. Previous solutions on broadcast authentication are mostly symmetric-key-based solutions such as μTESLA and multilevel μTESLA. These schemes are usually efficient; however, they all suffer from severe ene...

متن کامل

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Due to the low-cost nature of sensor network nodes, we cannot generally assume the availability of a high-performance CPU and tamperresistant hardware. Firstly, we propose a reliable broadcast message authentication working under the above-mentioned circumstances. The proposed scheme, although based on symmetric cryptographic primitives, is secure against anyone who knew the message authenticat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science and Information Technology

سال: 2014

ISSN: 2334-2366,2334-2374

DOI: 10.15640/jcsit.v2n3-4a6