ESKA: A Highly Reliable Authentication Protocol Based-on One-way Key Chain for WSN Broadcast

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Way Chain Based Broadcast Encryption Schemes

We propose a new broadcast encryption scheme based on the idea of ‘one key per each punctured interval’. Let r be the number of revoked users. In our scheme with p-punctured c-intervals, the transmission overhead is roughly r p+1 as r grows. Our scheme is very flexible with two parameters p and c. We may take p as large as possible if a user device allows a large key storage, and set c as small...

متن کامل

A Probabilistic Key Management Protocol based on Kryptograph for WSN

Security is a matter of extensive research interest with widespread deployment of WSN (Wireless Sensor Network) in various real life applications. Unreliable wireless communication, physically insecure locations and resource exhaustion attacks render sensor vulnerable to several security breaches. Sensors are supposed to operate on battery in hostile and unattended environment over a longer spa...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Improved Chain Based Routing Protocol for WSN

Abstact: A WSN is a specialized wireless network made up of a large number of sensors and at least one base station. Recent technological advances in communications and computation have enabled the development of low-cost, low-power,small in size, and multifunctional sensor nodes in a Wireless Sensor Network (WSN). Since the radio transmission and reception consumes a lot of energy, one of the ...

متن کامل

A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

Authentication and key agreement protocols play an important role in wireless sensor communication networks. Recently Xue et al’. suggested a key agreement protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems

سال: 2013

ISSN: 1178-5608

DOI: 10.21307/ijssis-2017-609