نتایج جستجو برای: secure communication
تعداد نتایج: 391555 فیلتر نتایج به سال:
In this position paper, we address some current limitations and challenges as well as emerging directions in three related areas of secure communication: (1) security in Wireless Sensor Networks – WSNs, (2) security in Mobile Ad Hoc Networks – MANETs, and, (3) security in Cellular Phone Networks.
In this paper, we propose a new deterministic key predistribution scheme for secure communication in wireless sensor networks. Our scheme provides better trade-off among scalability, computation overhead, connectivity and resilience against node captures than existing key predistribution schemes, particularly in situations where the nodes in the network are highly mobile.
Nowadays, Wireless Sensor Networks are a hot research topic in the scientific community. Researchers seek to maximize their autonomy while paying attention to their limited resources, few computing capacity and low energy consumption. Security mechanisms must be deployed in the architecture of almost all Wireless Sensor Networks. Several research papers have verified that group-based communicat...
A capstone project is a compulsory requirement for passing the last course and obtaining the bachelor’s degree. In order to make students develop their own self-learning capabilities, it is important to offer them real life projects, helping them in the process of combining already acquired information with new knowledge. In this contribution, we present the details of a real capstone project a...
Anonymous network helps to preserve user identity for secure communication in the network. The paper depicts a survey of anonymous networks and the various forms of threats faced by these networks. The survey begins by the e-mail anonymity which is treated to be the first conception in the field of network anonymity. A diversified set of attacks inimical to the anonymous networks are illustrated.
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal that achieves synchronization between the two chaotic signals. For the sake of comparison, an alternative master-slave synchronizing controller is designed and the two controllers are compared. Numerical simulations ar...
Industrial plants are heterogeneous networks with different computation and communication capabilities along with different security properties. The optimal operation of a plant requires a balance between communication capabilities and security features. A secure communication data flow with high latency and low bandwidth does not provide the required efficiency in a plant. Therefore, we focus ...
In this paper we propose a protocol that allows users operating mobile wireless personal devices to agree on a manual authentication protocol to use in a fair and secure way in order to bootstrap secure communication. Our protocol also has adjustable level of security and a variant of it is applicable to low-end devices with constrained user
Key establishment and its management in Wireless Sensor Networks is a challenging problem due to the limited resources and disordered structure of such networks. In this paper we propose a key management technique for Wireless Sensor Networks in building environments. In our solution each floor of a building is assigned a unique master key that will be used to generate other keys between pairs ...
It is common that users or hosts in a large network are partitioned and organized as a hierarchical tree where children of the same parent form a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals. Only legal receiving principals can decrypt the message, and illegal receiving principals cannot acquire an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید