Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS
نویسندگان
چکیده
منابع مشابه
Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS
The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them a...
متن کاملFreshness Consideration of Hierarchical Key Agreement Protocol in WSNs
Wireless sensor networks (WSNs) are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes with resource-constrained make security applications a challenging problem. Key agreement is a fundamental security service in WSNs, which enables sensor nodes to communicate securely with each other using cryptographic t...
متن کاملEfficient and Non-Interactive Hierarchical Key Agreement in WSNs
Wireless sensor networks (WSNs) have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Sensor nodes used are resource-constrained, which make security applications a challenging problem. Key agreement is a fundamental security servic...
متن کاملStrongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study key-agreement schemes that are well-suited for the mobile network environment. Specifically, we describe schemes with the following characteristics: • Non-interactive: any two nodes can compute a unique shared secret ke...
متن کاملFreshness Preserving Secure Data Gathering Protocol over Wireless Sensor Networks
Wireless sensor networks (WSNs) are vulnerable to various forms of security attacks because they are deployed in potentially adverse or even hostile environment. Research into security and routing mechanism designs specifically focused on WSNs has been challenging issues to researchers. Recently, Choi et al. proposed a secure data gathering protocol over WSNs based on an extended Sakai et al.’s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2014
ISSN: 1424-8220
DOI: 10.3390/s141223742