نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :Int. J. Communication Systems 2013
Daojing He Chun Chen Maode Ma Sammy Chan Jiajun Bu

Password-authenticated group key exchange protocols enable communication parties to establish a common secret key (a session key) by only using short secret passwords. Such protocols have been receiving significant attention. This paper shows some security weaknesses in some recently proposed passwordauthenticated group key exchange protocols. Furthermore, a secure and efficient password-authen...

Journal: :I. J. Network Security 2012
Kavitha Ammayappan V. N. Sastry Atul Negi

In this paper, we propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses ’authentic neighborhood’ for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of routing control messages at hop-by-hop level. This au...

Journal: :Journal of Advanced Research in Applied Sciences and Engineering Technology 2023

Internet of Things (IoT) has been widely accepted by users and with rapid development cloud computing, are able to access the IoT services in various environment, including smart home, healthcare factory. However, insecure as their data is being transmitted via open communication channel. The previous research protocol does not resist insider attack which leads scheme. In this proposal, we prop...

Journal: :International Journal of Advanced Computer Science and Applications 2023

The widespread adoption of Internet Things has brought many benefits to society, such as increased efficiency and convenience in various aspects daily life. However, this also led a rise security threats. Moreover, resource-constrained feature IoT devices makes them vulnerable attacks that compromise the user's privacy sensitive information confidentiality. It is therefore essential address con...

Journal: :Security and Communication Networks 2022

Fog computing is one of the prominent technology that bridges gap between IoT nodes and cloud servers. For increasing efficiency at fog level, a federation can be employed. level controlled by coordinator. However, information exchange coordinator needs to secured. Recently, lightweight secure key (LKSE) protocol for was proposed. In this paper, cryptanalysis LKSE carried out. The indicates vul...

Journal: :ITM web of conferences 2023

Wireless sensor networks (WSNs) are widely used in day to activities order provide users with multiple services such as smart grids, homes, industrial internet of things (IoT), agriculture and health-care. These provided by collecting transmitting the sensing data gateway node over an unsafe channel, having constraints security, energy consumption connectivity. In 2022, Fariss et al. proposed E...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :International Journal of Computing 2022

The Internet of Things (IoT) has become the fundamental infrastructure many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication over a public channel that exposes it to security threats and attacks. Therefore, this study intends protect data communication through decentralised multi-factor scheme for secure (DMUAS-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید