ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic Curve Cryptography (ECC) based Relational Database Watermarking

Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usua...

متن کامل

AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS

This memo describes the use of the Advanced Encryption Standard (AES) in the Counter and CBC-MAC Mode (CCM) of operation within Transport Layer Security (TLS) to provide confidentiality and data-origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments, while at the same time providing a high level of security. The ciphe...

متن کامل

Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs

California State University, East Bay, Hayward, CA, USA Summary A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in this network is challenging. Threshold Cryptography (TC) provides a promise of securing this network. In this paper, ...

متن کامل

WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes

While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...

متن کامل

An Elliptic Curve Cryptography Based Enhanced Adaptive Acknowledgment (ecc-eaack) Intrusion Detection System

MANET is a new wireless network technology increasingly used in many applications. These networks are more vulnerable to attacks than wired networks. Since they have different characteristics, conventional security techniques are not directly applicable to them. Intrusion detection system (IDS) is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. Researchers cu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The SIJ Transactions on Computer Networks & Communication Engineering

سال: 2017

ISSN: 2321-239X,2321-2403

DOI: 10.9756/sijcnce/v5i4/05010120101