نتایج جستجو برای: avispa
تعداد نتایج: 166 فیلتر نتایج به سال:
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
Password-authenticated group key exchange protocols enable communication parties to establish a common secret key (a session key) by only using short secret passwords. Such protocols have been receiving significant attention. This paper shows some security weaknesses in some recently proposed passwordauthenticated group key exchange protocols. Furthermore, a secure and efficient password-authen...
In this paper, we propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses ’authentic neighborhood’ for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of routing control messages at hop-by-hop level. This au...
Internet of Things (IoT) has been widely accepted by users and with rapid development cloud computing, are able to access the IoT services in various environment, including smart home, healthcare factory. However, insecure as their data is being transmitted via open communication channel. The previous research protocol does not resist insider attack which leads scheme. In this proposal, we prop...
A Blockchain-based Three-factor Mutual Authentication System for IoT using PUFs and Group Signatures
The widespread adoption of Internet Things has brought many benefits to society, such as increased efficiency and convenience in various aspects daily life. However, this also led a rise security threats. Moreover, resource-constrained feature IoT devices makes them vulnerable attacks that compromise the user's privacy sensitive information confidentiality. It is therefore essential address con...
Fog computing is one of the prominent technology that bridges gap between IoT nodes and cloud servers. For increasing efficiency at fog level, a federation can be employed. level controlled by coordinator. However, information exchange coordinator needs to secured. Recently, lightweight secure key (LKSE) protocol for was proposed. In this paper, cryptanalysis LKSE carried out. The indicates vul...
Wireless sensor networks (WSNs) are widely used in day to activities order provide users with multiple services such as smart grids, homes, industrial internet of things (IoT), agriculture and health-care. These provided by collecting transmitting the sensing data gateway node over an unsafe channel, having constraints security, energy consumption connectivity. In 2022, Fariss et al. proposed E...
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
The Internet of Things (IoT) has become the fundamental infrastructure many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication over a public channel that exposes it to security threats and attacks. Therefore, this study intends protect data communication through decentralised multi-factor scheme for secure (DMUAS-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید