ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes
نویسندگان
چکیده
منابع مشابه
Elliptic Curve Cryptography (ECC) based Relational Database Watermarking
Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usua...
متن کاملAES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS
This memo describes the use of the Advanced Encryption Standard (AES) in the Counter and CBC-MAC Mode (CCM) of operation within Transport Layer Security (TLS) to provide confidentiality and data-origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments, while at the same time providing a high level of security. The ciphe...
متن کاملElliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs
California State University, East Bay, Hayward, CA, USA Summary A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in this network is challenging. Threshold Cryptography (TC) provides a promise of securing this network. In this paper, ...
متن کاملWM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...
متن کاملAn Elliptic Curve Cryptography Based Enhanced Adaptive Acknowledgment (ecc-eaack) Intrusion Detection System
MANET is a new wireless network technology increasingly used in many applications. These networks are more vulnerable to attacks than wired networks. Since they have different characteristics, conventional security techniques are not directly applicable to them. Intrusion detection system (IDS) is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. Researchers cu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The SIJ Transactions on Computer Networks & Communication Engineering
سال: 2017
ISSN: 2321-239X,2321-2403
DOI: 10.9756/sijcnce/v5i4/05010120101