نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

2017
Rajwinder Kaur Usvir Kaur

The vehicular adhoc network is the type of network.It is self configuring and decentralized architecture. In the vehicular adhoc network two type of communication is possible which is vehicle to vehicle and vehicle to infrastructure. Due to decentralized architecture of vehicular adhoc networks many malicious nodes may join the network which is responsible to trigger various type of active and ...

Journal: :IACR Cryptology ePrint Archive 2003
Zhongliang Chen

In this paper we propose security analysis on passive attack for Nalla-Reddy’s ID-AK-2 and ID-AK-3 protocols. Keywors:Passive attack,Tripartite key agreement,Bilinear pairings

LEE W.E., ,

Penetration and dissolution mechanisms are reviewed for predominantly single-phase oxide, two phase oxide and oxide-carbon composite refractories by liquid silicate slags. Theoretical models of these processes, as well as static (sessile drop, dipping and crucible) and dynamic (rotating finger and rotary slag) experimental tests, along with their practical limitations are considered. Direct (co...

2016
Anuradha Jayakody Rohan Samarasinghe Saluka R. Kodituwakku

In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the ne...

2016
Wenjuan Li Weizhi Meng Lam-for Kwok Horace Ho-Shing Ip

To enhance the performance of single intrusion detection systems (IDSs), collaborative intrusion detection networks (CIDNs) have been developed, which enable a set of IDS nodes to communicate with each other. In such a distributed network, insider attacks like collusion attacks are the main threat. In the literature, challenge-based trust mechanisms have been established to identify malicious n...

2017
Gagandeep Kaur

The vehicular ad hoc network is the decentralized type of network in which mobile nodes can communicate with each other. Due to self configuring nature of the network malicious nodes join the network which are responsible to trigger various types of active and passive attacks in the network. The jamming attack is the active type of attack in which malicious node select the nodes which will be c...

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

Journal: :IACR Cryptology ePrint Archive 2005
Jue-Sam Chou Chu-Hsing Lin Chia-Hung Chiu

In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol. Keyword: ID-based, Weil-paring, impersonation attack, tripartite authenticated key agreement, unknown key share attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید