نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :Wireless Networks 2022

With the advancement and wide deployment of Internet Things, Low Power Wide Area Network (LPWAN) technologies will respond to applications requiring low power long range features. In this context, mobility is an additional requirement needed by several including supply chain monitoring health-care supervision. Proxy Mobile IPv6 (PMIPv6) as extension Protocol (IP) used in LPWAN protocol stack si...

Journal: :International Journal of Healthcare Information Systems and Informatics 2021

The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications IoT. Online report generation and sharing the reports reduce time make treatment patients fast. Here, safety patient data plays a crucial role. As there restriction resources nodes, design authentication scheme for WMSNs not an easy task applications. Healthcare professionals are using their mobi...

Journal: :International Journal of Power Electronics and Drive Systems 2022

<p><span>Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase use IoT applications worldwide. Distributed can be implemented securely with the support blockchain. By default, blockchain will ensure authentication involved entities as well integrity data. Due to storage restrictions, hybrid system preferred, involves cloud server ...

Journal: :IEEE Systems Journal 2022

The major advances in body-mounted sensors and wireless technologies have been revolutionizing the healthcare industry, where patient’s conditions can be remotely monitored by medical staff. Such a model is gaining broad support due to its economic social advantages. However, wealth of sensor measurements pose technical challenges on store collected data, how ensure integrity, who control acces...

Journal: :Eurasip Journal on Wireless Communications and Networking 2022

Abstract Given the ever-increasing advances in science and technology recent years, security authentication issues using elliptic curve cryptography (ECC) have gained a lot of attentions especially for smart cards variety networks, such as homes medical-based care systems being based on Internet things (IoT). In health care, patient information is always crucial no one should access to this inf...

Journal: :The Journal of Supercomputing 2023

The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the IoT (IIoT) environment to enforce efficient and effective service discovery collaboration between smart objects in friendly scalable way. Therefore, such environment, establishment secure trust communication scheme crucial need peer devices having similar profiles. In addition,...

Journal: :IEEE Access 2022

Urban air mobility (UAM) is a future transportation system to solve the pollution and movement efficiency problems of traditional system. In UAM environments, unmanned aerial vehicles (UAV) are used transport passengers goods providing various convenient services such as package delivery, bus, taxi. However, UAVs communicate with ground infrastructures through open channels that can be exposed ...

Journal: :Int. J. Communication Systems 2011
Chun Chen Daojing He Sammy Chan Jiajun Bu Yi Gao Rong Fan

Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some secu...

Journal: :Mathematics 2022

Many CAN-based session key sharing approaches are based on the group scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in network if is leaked. To address above problem, we propose a provable secure distribution protocol improved NSSK (Needham–Schroeder shared key) for in-vehicle CAN network. We applied mechanisms of message authentication and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید