نتایج جستجو برای: broadcast authentication
تعداد نتایج: 63999 فیلتر نتایج به سال:
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained m...
Automatic Dependent Surveillance-Broadcast (ADS-B) system provides significant improvements in air traffic control such as optimal routing non-radar environments with a new level of safety and efficiency. The ADS-B is being installed many aircrafts recent year. equipped aircraft broadcasts the information to nearby ground stations either once or twice per second. Because open channel communicat...
In modern electronic distribution networks, message authentication is an important objective of information security. This objective is met by providing the receiver of a message an assurance of the sender’s identity. As physical protection such as sealed envelopes is not possible for messages expressed as binary sequences, digital tools have been developed using cryptography. A major limitatio...
Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show tha...
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports ...
Abstract—Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure information security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Computing Model (TCM) of network security authentication is propose...
The authentication of VANET messages continues to be an important research challenge. Although much research has been conducted in the area of message authentication in wireless networks, VANETs pose unique challenges, such as real-time constraints, processing limitations, memory constraints, requirements for interoperability with existing standards, extensibility and flexibility for future req...
Broadcast and broadband communications have undoubt- edly become a part of today’s social life. Accessibility of content of interest to the audience at any place and at any time regardless of the type of content consumer device can have an effective contribution to the desire of the audience to use of the broadcast content. The HD and Ultra HD qualities, the desire for demand-driven application...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید