نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

2010
Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar Eun-suk Cho

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verifi...

Journal: :Ad Hoc Networks 2016
Xinjiang Sun Xiaobei Wu Cheng Huang Zhiliang Xu Jianlin Zhong

Though lots of research results about self-healing key management under unreliable links have been proposed, there are still some shortcomings, such as the inefficiency of broadcasts, lack of broadcast authentication, limited sessions for key issues, disastrous risks of access polynomials, and the vulnerability of collusion attacks. In this paper, we propose two modified access polynomial based...

Journal: :JSW 2008
Bogdan Groza

A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains constructed with the squaring function which gives the possibility to construct a one-way chain of whose length is unbounded in practice. Although the computational cost is somewhat increased, compared to the use of hash...

2008
Haowen Chan Adrian Perrig

We present several latency optimizations on two classes of broadcast authentication schemes for networks where the topology and the identities of the receiving nodes are known a-priori. Let n be the number of receivers in the network. The first class of protocols involves the construction and dissemination of a hash tree with message authentication codes (MACs) at the leaves. We show that this ...

Journal: :Ad Hoc & Sensor Wireless Networks 2016
Kanika Grover Alvin S. Lim Seungbae Lee Qing Yang

Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...

2012
Bogdan Groza

Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational constraints, but symmetric primitives can be used ...

1985
Flaviu Cristian Houtan Aghili Ray Strong Danny Dolev

In distributed systems subject to random communication delays and component failures, atomic broadcast can be used to implement the abstraction of synchronous replicated storage, a distributed storage that displays the same contents at every correct processor as of any clock time. This paper presents a systematic derivation of a family of atomic broadcast protocols that are tolerant of increasi...

2015

Wireless sensor network is a group of specialized transducer with communication infrastructure for monitoring and recording at diverse location. There is a need for a secure channel between a sensor node and an internet host, during the integration of wireless sensor networks into the internet of things. By using Security protocols for Sensor networks (SPINS) scheme, it is possible to secure co...

2015
Chithra Rajagopal Kalaavathi Bhuvaneshwaran

WiMAX networks are the most suitable for E-Learning through their Broadcast and Multicast Services at rural areas. Authentication of users is carried out by AAA server in WiMAX. In E-Learning systems the users must be forced to perform reauthentication to overcome the session hijacking problem. The reauthentication of users introduces frequent delay in the data access which is crucial in delayi...

Journal: :J. Network and Computer Applications 2011
Hyun Sung Kim

The developing IEEE 802.22 standard will allow broadband access to be provided in sparsely populated areas by using cognitive radio techniques with operations on a non-interfering basis over television broadcast bands. Such non-interfering basis operation will increase the efficiency of utilisation of that spectrum, and provide large economic and societal benefits. However, the security mechani...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید