نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
In many wireless sensor network applications, sensor nodes that have a limited battery power are deployed in open and unattended environments. Owing to these features, an adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. This attack not only depletes a limited energy resource but also gives a false alar...
A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an adversary can predict the durations of operations that he will induce on the data structure. In this paper we introduce the problem of designing data structures that confound an adversary attempting to predict the timing of fut...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. A minimum condition for the security of the key is the hardness of guessing a value that is similar to the secret, because the fuzzy extractor converts such a guess to the key. We define fuzzy min-entropy to quantify this property of a noisy source of...
Consider an abstract storage device Σ(G) that can hold a single element x from a xed, publicly known nite group G. Storage is private in the sense that an adversary does not have read access to Σ(G) at all. However, Σ(G) is non-robust in the sense that the adversary can modify its contents by adding some offset ∆ ∈ G. Due to the privacy of the storage device, the value ∆ can only depend on an a...
Sungkyunkwan University, Suwon 440-746, Republic of Korea Summary In sensor networks, nodes can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme for filtering false data injection can detect and drop such false reports during the forwarding phase. In this scheme, ch...
In wireless sensor networks (WSNs), the energy and computational capacity of nodes are limited they deployed in a hostile environment. An adversary can easily compromise node injects false data into network. This injection drastically depletes designated on route for forwarding source data. Many filtering methods have been proposed to tackle security issues but also increase communication cost ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید