نتایج جستجو برای: broadcast authentication
تعداد نتایج: 63999 فیلتر نتایج به سال:
Vehicle ad hoc network (VANET) is an open communication environment. Any user can broadcast messages, which means that it be easily attacked by malicious users. Therefore, the authentication of vehicles needed. In this paper, we propose a Chebyshev polynomial-based conditional privacy-preserving and group-key agreement scheme for VANET. Specifically, solve three problems in VANET: (1) improve e...
A wireless ad-hoc network is a collection of mobile nodes with no fixed infrastructure. Security in such networks poses serious challenges due to (i) the network connectivity could be intermittent and hence on-line authentication is not guaranteed, and (ii) susceptible to wide range of attacks due to broadcast communication and large scale number of users. In this paper, we propose a security p...
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances s...
Route identification and digital signature has been considered in Mobile Ad hoc NETwork (MANET) for efficient message broadcasting. The integrity and authenticity through acknowledgement packets, forged acknowledgment attack is not possible due to dynamic traffics. In addition, the route identification usually filters out newly observed polluted nodes through digital signature scheme. Thus, the...
-The technological progress of recent years made available devices for a large audience, which is powerful enough to randomly form Mobile Ad Hoc Networks (MAHNWs). However the spread of MAHNWs is still obstructed by unsettled technical issues. Besides the topics related to the functionality of a MAHNW (e.g. location of mobile stations, routing protocols) the proliferation of the MAHNWs is condi...
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing cryptography techniques are in...
In this paper, we present a scheme for generating cryptographic checksums to perform message authentication in a one-way broadcasting system. The proposed scheme is based on the use of clockcontrolled LFSRs and is aimed at high-speed implementation for real-time applications. INTRODUCTION In a typical secure broadcasting system, source information (video, voice, images, text,..., etc.) are tran...
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computing devices equipped with different sensors. Sensor networks collect and process environmental data and can be used for habitat monitoring, precision agriculture, wildfire detection, structural health monitoring and many other applications. Securing sensor networks calls for novel solutions, especi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید