ESKA: A Highly Reliable Authentication Protocol Based-on One-way Key Chain for WSN Broadcast
نویسندگان
چکیده
منابع مشابه
One-Way Chain Based Broadcast Encryption Schemes
We propose a new broadcast encryption scheme based on the idea of ‘one key per each punctured interval’. Let r be the number of revoked users. In our scheme with p-punctured c-intervals, the transmission overhead is roughly r p+1 as r grows. Our scheme is very flexible with two parameters p and c. We may take p as large as possible if a user device allows a large key storage, and set c as small...
متن کاملA Probabilistic Key Management Protocol based on Kryptograph for WSN
Security is a matter of extensive research interest with widespread deployment of WSN (Wireless Sensor Network) in various real life applications. Unreliable wireless communication, physically insecure locations and resource exhaustion attacks render sensor vulnerable to several security breaches. Sensors are supposed to operate on battery in hostile and unattended environment over a longer spa...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملImproved Chain Based Routing Protocol for WSN
Abstact: A WSN is a specialized wireless network made up of a large number of sensors and at least one base station. Recent technological advances in communications and computation have enabled the development of low-cost, low-power,small in size, and multifunctional sensor nodes in a Wireless Sensor Network (WSN). Since the radio transmission and reception consumes a lot of energy, one of the ...
متن کاملA Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
Authentication and key agreement protocols play an important role in wireless sensor communication networks. Recently Xue et al’. suggested a key agreement protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems
سال: 2013
ISSN: 1178-5608
DOI: 10.21307/ijssis-2017-609