نتایج جستجو برای: broadcast authentication
تعداد نتایج: 63999 فیلتر نتایج به سال:
To fulfill two integral aims of abating cellular traffic and enhancing efficiency network, D2D is considered as a novel channel communication. This form communication has introduced for 4th enacts significant role in the 5th generation. Four scenarios defined references, includes direct relaying both with without infrastructure. One major challenges addressing protocols contributes to fact that...
Digital Watermarking technique is used to embed the useful information in a transmission media for copyright protection, authentication and broadcast monitoring etc. This paper describes an image hiding method using Fast Fourier Transform (FFT) algorithm which calculates the Peak Signal to Noise Ratio (PSNR) values and compare them with Gray Scale and Discrete Cosine Transform (DCT). The experi...
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication scheme based on Tso et al.’s IBS scheme with message recovery to achieve security requirements in wireless sensor networks. They claim that their scheme can achieve security requirements and mitigated DOS attack by limiting the times of signature verification failures in wireless sensor networks (WSN). However, w...
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with fixed equipment, referred to as Road Side Units (RSUs). The RSUs within range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). V2V in VANETs is vulnerable cyber-attacks involving message manipulation. Thus, mechanisms should be applied ensure...
"Broadcast" theory is one of the common theories explaining how phenomena and ideas spread. It is used by researchers in different fields of study. Having studied broadcast theory and its different components, this article tries to represent whether Islamic revolution of Iran has exerted influence on Saudi Arabia. And if positive, how it has influenced and how much it has been. The results sug...
The way to use limited bandwidth resources achieve high-quality video services in vehicular networks is an important research topic. A large number of studies have shown that the fast-growing field software defined networking (SDN) can provide solutions problems encountered by traditional IP when implementing multicasting. However, there no addressing security issues for this scenario. In paper...
The ground-based augmentation system (GBAS) is the cornerstone for enabling automated landings without instrument landing (ILS). Currently, GBAS evolving to approach service type-D (GAST-D) category III landings. This development toward GAST-D extends via use of multiple frequencies (L1/L2 and L5) global navigation satellite constellations. requires correction data be broadcast aircraft, which ...
Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the...
Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics
Emergency logistics is of great significance for supply security in emergencies. As a crucial component strategic material reserve and allocation, emergency characterized by high levels safety efficacy. The the IoT-based system cannot be overstated, considering potential damage caused malicious accessors. Authentication an essential means security. Existing certificateless authentication protoc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید