نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

Journal: :International journal of wireless and mobile networks 2021

To fulfill two integral aims of abating cellular traffic and enhancing efficiency network, D2D is considered as a novel channel communication. This form communication has introduced for 4th enacts significant role in the 5th generation. Four scenarios defined references, includes direct relaying both with without infrastructure. One major challenges addressing protocols contributes to fact that...

2014
Chetika Sharma Ashish Oberoi

Digital Watermarking technique is used to embed the useful information in a transmission media for copyright protection, authentication and broadcast monitoring etc. This paper describes an image hiding method using Fast Fourier Transform (FFT) algorithm which calculates the Peak Signal to Noise Ratio (PSNR) values and compare them with Gray Scale and Discrete Cosine Transform (DCT). The experi...

2014
Yalin Chen Jue-Sam Chou

Recently, Shm et al. Proposed an efficient identity-based broadcast authentication scheme based on Tso et al.’s IBS scheme with message recovery to achieve security requirements in wireless sensor networks. They claim that their scheme can achieve security requirements and mitigated DOS attack by limiting the times of signature verification failures in wireless sensor networks (WSN). However, w...

Journal: :IEEE open journal of vehicular technology 2023

Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with fixed equipment, referred to as Road Side Units (RSUs). The RSUs within range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). V2V in VANETs is vulnerable cyber-attacks involving message manipulation. Thus, mechanisms should be applied ensure...

Barzegar, Ebrahim , Husseini, Seyyed Muhammad Sadeq ,

"Broadcast" theory is one of the common theories explaining how phenomena and ideas spread. It is used by researchers in different fields of study. Having studied broadcast theory and its different components, this article tries to represent whether Islamic revolution of Iran has exerted influence on Saudi Arabia. And if positive, how it has influenced and how much it has been. The results sug...

Journal: :IEEE Transactions on Mobile Computing 2022

The way to use limited bandwidth resources achieve high-quality video services in vehicular networks is an important research topic. A large number of studies have shown that the fast-growing field software defined networking (SDN) can provide solutions problems encountered by traditional IP when implementing multicasting. However, there no addressing security issues for this scenario. In paper...

Journal: :International Journal on Smart Sensing and Intelligent Systems 2013

Journal: :IEEE Aerospace and Electronic Systems Magazine 2021

The ground-based augmentation system (GBAS) is the cornerstone for enabling automated landings without instrument landing (ILS). Currently, GBAS evolving to approach service type-D (GAST-D) category III landings. This development toward GAST-D extends via use of multiple frequencies (L1/L2 and L5) global navigation satellite constellations. requires correction data be broadcast aircraft, which ...

2014
B. Vijayalakshmi K. Kumar

Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the...

Journal: :IEEE Access 2023

Emergency logistics is of great significance for supply security in emergencies. As a crucial component strategic material reserve and allocation, emergency characterized by high levels safety efficacy. The the IoT-based system cannot be overstated, considering potential damage caused malicious accessors. Authentication an essential means security. Existing certificateless authentication protoc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید