Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them a...

متن کامل

Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs

Wireless sensor networks (WSNs) are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes with resource-constrained make security applications a challenging problem. Key agreement is a fundamental security service in WSNs, which enables sensor nodes to communicate securely with each other using cryptographic t...

متن کامل

Efficient and Non-Interactive Hierarchical Key Agreement in WSNs

Wireless sensor networks (WSNs) have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes used are resource-constrained, which make security applications a challenging problem. Key agreement is a fundamental security servic...

متن کامل

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study key-agreement schemes that are well-suited for the mobile network environment. Specifically, we describe schemes with the following characteristics: • Non-interactive: any two nodes can compute a unique shared secret ke...

متن کامل

Freshness Preserving Secure Data Gathering Protocol over Wireless Sensor Networks

Wireless sensor networks (WSNs) are vulnerable to various forms of security attacks because they are deployed in potentially adverse or even hostile environment. Research into security and routing mechanism designs specifically focused on WSNs has been challenging issues to researchers. Recently, Choi et al. proposed a secure data gathering protocol over WSNs based on an extended Sakai et al.’s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2014

ISSN: 1424-8220

DOI: 10.3390/s141223742